Unit2
Unit2
Electronic
Payment Systems
Introduction to Electronic Payment systems
Advantages of EPS
• Reduces the time requirement to get your funds transfer
• Eliminates storage, handling and processing of paper documents
• Reduces visibility of transactions and information
• Reduces cost of transaction
(operational and processing cost)
Disadvantages
• All financial institutions may not be able to offer the
level of sophisticated services of e-payment
• Digital information can be hacked or electronically
trespassed
• There is an issue of system’s reliability as there are
chances of system failure if not handled properly,
requirement of fault tolerance systems
• Requirement of technical knowledge to perform
financial transactions appropriately
• Requirement of secured and sophisticated EPS that
must be able to integrate all other systems required for
financial transaction
1. Credit Card
6. Expiration month and year: It is visible on the front side (also stored on the magnetic stripe or chip). The card is valid until the
last day of the month printed on it.
7. Card brand logo: It is the name of the credit card network company. Visa and MasterCard are leading credit card network
companies. Rupay is Indian domestic open loop card launched in 2012.
8. Magnetic stripe: It is an iron based magnetic material containing encrypted data about the card holder and account number.
9. Hologram: Hologram is a security feature that prevents duplication. It is a 3-dimentional image formed by interference of light
beams.
10. Signature: It is cardholder’s signature at the back of the card, used as an attempt to identify cardholder’s identity. It also holds
the last 4 digits of card number.
11. CVC/CVV: Card Verification code/ value is a 3 digit code usually printed to the left of signature pane validates the card. CVC2 is
used in contact less transactions.
2.Debit Card:
Debit Card is an electronic payment card where the transaction amount is deducted directly from
the card holder’s bank account upon authorization.
Debit card is a great option for customers to make purchases within their paying capacity. A debit
card allows a customer to make payments with the balance that already exists in his/her bank
account. Being a popular payment method, debit card is the second largest eCommerce payment
gateway used in India.
The debit card and credit card are identical in their physical properties. It is difficult to differentiate
two by their appearance unless they have the term credit or debit imprinted.
2. Debit Card
• A debit card is a payment card that deducts money directly from a consumer’s checking account to
pay for a purchase
• Debit cards eliminate the need to carry cash or physical checks to make purchases directly from your
savings
• Debit cards do not allow the user to go into debt,
• except perhaps for small negative balances that might be incurred if the user has signed up
for overdraft protection
• Debit cards usually have daily purchase limits,
• meaning it may not be possible to make an especially large purchase
• Also called asset card (in the US), or payment card (in the UK)
3. Stored value cards
• Stored value card is a type of debit card that is pre-loaded with certain amount(value), with which
a payment is made. It is a card that has default monetary value onto it. The card may be disposed
when the value is used, or recharged to use it again.
• The major advantage of stored value card is that customers don’t need to have a bank account to
get prepaid cards.
3. Stored value cards
There are two varieties for stored value card.
1. Closed loop (single purpose)
• In closed loop cards, money is metaphorically stored on the card in the form of binary-coded
data. Closed loop cards are issued by a specific merchant or merchant group and can only be
used to make purchases from specific place. e.g. chennai metro rail travel card.
Plastic cards issued by banks for Widely accepted, fraud protection, Convenience, rewards programs, Risk of fraud, high-interest rates
Credit/Debit Cards
payments. credit facility (credit cards). buyer protection. (credit), transaction fees.
Mobile Wallets (e.g., PayPal, Apple Apps store payment details and NFC payments, digital transactions, Fast, convenient, contactless Dependent on smartphone, data
Pay, Google Pay) facilitate transactions. integration with apps. payments, secure transactions. privacy concerns.
Cryptocurrencies (e.g., Bitcoin, Digital currency using blockchain Decentralized, anonymous, low fees, No central authority, fast Volatile value, limited acceptance,
Ethereum) technology. global acceptance (in some cases). international payments. regulatory issues.
Real-time payment system in India Instant transfers, linked to mobile No need to enter bank details, 24/7 Limited to India, dependent on
UPI (Unified Payments Interface)
enabling instant money transfers. number, secure PIN. availability, low fees. internet connectivity.
Electronic version of traditional Uses bank routing and account Cost-effective, paperless, suitable Processing time can be longer than
Digital Checks (eChecks)
paper checks. number for payments. for recurring payments. card payments.
Cards preloaded with a set amount No bank account needed, Budget control, can be used like Limited use, may incur reload or
Prepaid Cards
for transactions. reloadable, anonymous payments. credit/debit cards. usage fees.
Buy Now, Pay Later (BNPL) (e.g., Allows consumers to split payments Short-term financing, installment Flexibility, accessible to those High late fees, encourages
Afterpay, Klarna) over time. payments, interest-free periods. without credit cards. overspending, credit checks.
3. Hardware/Software Costs
• Point of Sale (POS) Systems: Costs for purchasing or leasing POS terminals for card payments.
Costs vary depending on features and integrations.
• Software Licensing: Some payment systems require specific software licenses, which may
involve one-time or recurring fees.
Cost involved in electronic payment system
4. Compliance Costs
• PCI-DSS Compliance: For businesses handling card payments, adhering to the Payment Card Industry
Data Security Standard (PCI-DSS) can incur costs related to audits, network security, and data encryption.
• Anti-Money Laundering (AML) and Know Your Customer (KYC): Costs associated with compliance
programs and regulatory requirements.
Dishonest
Stolen payment
merchants &
credentials and Impulse buying
financial
password
providers
Payment Lack of
conflicts anonymity
A) Payment conflicts
Non- Safety
Authentication
repudiation
Security Requirements of EPS
1. Confidentiality: Protect sensitive payment information from unauthorized access.
2. Integrity: Ensure data is not altered or tampered with during transactions.
3. Authentication: Verify the identities of users and merchants involved in the transaction.
4. Non-repudiation: Provide proof of transaction to prevent denial by either party
5. .Authorization: Ensure only authorized users can initiate and complete transactions.
6. Availability: Keep the payment system functional and accessible at all times.
Measures to ensure Security
• Major security measures are following −
1. Encryption − It is a very effective and practical way to safeguard the data being
transmitted over the network. Sender of the information encrypts the data using a
secret code and only the specified receiver can decrypt the data using the same or a
different secret code.
2. Digital Signature − Digital signature ensures the authenticity of the information. A digital
signature is an e-signature authenticated through encryption and password.
3. Security Certificates − Security certificate is a unique digital id used to verify the identity
of an individual website or user.
Security Protocols in Internet
• some of the popular protocols used over the internet to ensure secured online
transactions.
1. Secure Socket Layer (SSL)
• It is the most commonly used protocol and is widely used across the industry. It
meets following security requirements −
• Authentication
• Encryption
• Integrity
• Non-reputability
Note - "https://" is to be used for HTTP urls with SSL, where as "http:/" is to be used for
HTTP urls without SSL.
Security Protocols in Internet
2.Secure Hypertext Transfer Protocol (SHTTP)
• SHTTP extends the HTTP internet protocol with public key encryption, authentication,
and digital signature over the internet. Secure HTTP supports multiple security
mechanism, providing security to the end-users.
• SHTTP works by negotiating encryption scheme types used between the client and the
server.
Security Protocols in Internet
3. Secure Electronic Transaction (SET) Protocol
• Jointly designed by MasterCard and Visa with backing of Microsoft, Netscape, IBM, GTE, SAIC,
and others
• Designed to provide security for card payments as they travel on the Internet
• Contrasted with Secure Socket Layers (SSL) protocol, SET validates consumers and merchants in
addition to providing secure transmission
• SET specification
• Uses public key cryptography and digital certificates for validating both consumers and merchants
• Provides privacy, data integrity, user and merchant authentication, and consumer nonrepudiation
The SET protocol Working
The SET protocol Working
• The diagram illustrates the steps involved in the SET (Secure Electronic Transaction) protocol for secure online
payments. This ensures secure payment processing and non-repudiation.
1. Cardholder Initialization: The cardholder starts the transaction by placing an order with the merchant and sending
payment details.
2. Merchant Request: The merchant sends the order information and a payment request to the payment gateway.
3. Payment Gateway Processing: The payment gateway, connected to the acquirer, processes the payment details
and forwards the transaction to the payment network.
4. Issuer Validation: The issuer (cardholder's bank) verifies the payment details and either approves or declines the
transaction.
5. Payment Network Communication: The payment network communicates the transaction status back to the
payment gateway and acquirer.
6. Certificate Authority Role: Throughout the process, the Certificate Authority validates the authenticity of all parties
involved using digital certificates.
7. Completion: The transaction is completed, and the payment status is conveyed back to the merchant and
cardholder.