Presentasjon lastes. Vennligst vent

Presentasjon lastes. Vennligst vent

ECheck and eCheckSecure

Liknende presentasjoner


Presentasjon om: "ECheck and eCheckSecure"— Utskrift av presentasjonen:

1 ECheck and eCheckSecure
Group 19 Marie M. Moltubakk, Iqbal Habib, Bjørnar Waage, Silje Øie, Samson A. Tedla

2 Part one of the exercise:
What specific information is needed to pay with an eCheck? After making a purchase, from the site:

3 What you want to purchase and the amount of the product or/and service.
First name, last name, address, city, ZIP code, Bank Branch Location and home phone number. Written in a sign-in chart to confirm your personal or company account information. Date of birth and US Drivers License or StateID. They then write the check information for you automatically, and they ask you to “Please remove and VOID the next check in your check book and enter the following information from that check carefully.” Then they ask you if your paper check is similar or not to their example, this is so they can give you an explanation on where to find the numbers you are to write in. The numbers are your routing number, account number and check number. Then you get a visual example of how your paper check look like when is filled out with all the information needed. And you are asked to type your name, as a signature, to verify that you agree with the information given in the visual check above. ·        And finally you get a confirmation that your check has been approved. With the text

4

5

6

7 Check

8

9 eCheckSecureä Privacy Statement Information Collection and Use
ECheckSecure will not sell, share, or rent this information to others in any way other than what is disclosed in this statement eCheckSecure Usage A user must be passed to eCheckSecure via an authorized online merchant or broker. Payment ECheckSecure request information from the user on our verification forms. Cookies eCheckSecure does not use cookies some of our business partners and other entities use cookies on their sites prior to the user arriving at eCheckSecure (for example, advertisers). HoeCheckSecurever, eCheckSecure have no access to, or control over these cookies. Log Files ECheckSecure use IP addresses to analyse trends, administer the site, track users’ movement, and gather broad demographic information for aggregate use

10 Correction/Updating Personal Information
Sharing ECheckSecure may share aggregated demographic information with our partners and advertisers from time-to-time. This is not linked to any personal information that can identify any individual person. ECheckSecure partner with a credit verification company to verify the identification and credit history of users’ checking accounts This company may retain, share, store or use information for any secondary purpose and is beyond our control. Links This eCheckSecureb site contains links to other sites. Security The eCheckSecure eCheckSecurebsite takes every precaution to protect our users’ information. When users submit sensitive information via the eCheckSecurebsite, that information is protected both on and off-line. Correction/Updating Personal Information Information provided to eCheckSecure by the user cannot be changed by anyone once the transaction has been processed. It is the responsibility of the user to insure that all the information provided is correct prior to completing the transaction. Notification of Changes ECheckSecure will always use information in accordance with the privacy policy under which the information was collected.

11 Conclusion The demo was easy enough to use, but I had no feeling that this was a secure way to do it. It is easy for newcomers in the EC , and Internet shopping.(compared to a routine you already have.)

12 How does eCheck Secure guarantee online checks? Security
When our verification forms ask users to enter sensitive information (such as driver’s license and financial information) protected with state-of-the-art SSL encryption technology and Digital certificates. authorized eCheckSecure administrators who need the information to perform a specific job (for example, our billing clerk or a customer service representative).

13

14 Why we use eSecure /eCheck?
Data: By 2004 only 80% of online payments will be made with a creadit card while the number of US households that do not have a credit car will double between 1998 and 2003. The personal information given by the costumer and user is used to identify the user and checking information for the purpose of creating an electronic check transaction The data are then converted by eCheck Secure into an electronic check that can be securely transmitted to the Automated Clearing House (ACH) network. Once the information is verified through one of the man risk management services available And the transaction has completed electronically via ACH and founds are deposited into the merchants bank within the usual 2-4 working days The electronically is a Financial Service Mark-up Language (FSML) that use HTML for sending payment messages that includes eChecks Risk Managemnet Services Equifax is the leading provider of consumer credit infromation in US. Back Office Account Mangemnet The eCheck secure back office is a secure data repository of all eCheck Secure transaction history and merchant account profiles. Users can view reports, query transaction status.

15 Fully Electronic Check Settlement
–ACH Freeing consumers and marchants the inconvenences posed by papper drafts. confirmation

16 Next Group 23 Kjersti Grov, Geir Tommy Nilson, Kari Janne Pedersen, Rune Nygård

17 Bolt.com upoc.com

18 Hva er bolt.com? Kanal for å etablere dialoger med 15 – 24 år gamle mennesker Bolts medlemmer kommer til bolt for å dele deres meninger og synspunkter Møte nye mennesker fra rundt omkring I verden Styrer diskusjoner og innhold gjennom alle plattformer

19 Hva er bolt.com? (forts.) Forsørger brukere med gratis hjemmesider, , musikknedlasting, øyeblikkelige meldinger, spill og mer

20 Hva er bolt.com? (forts) PC Trådløse mekanismer Mobiltelefoner

21 Markedsføringsstrategi
Har gjort minimalt med konsumentmarkedsføring Har hovedsaklig vokst gjennom jungeltelegrafen og gjennom strategiske partnerskap med noen av de største merkene på webben

22 Partnere AT & T Coca-Cola Nike Clairol Ford Motor Company Kodak
Maybelline Neutrogena Cosmetics Paramount Home Video PDFA Microsoft Cingular Sony Pictures Entertainment Procter & Gamble

23 Upoc.com Upoc.com startet i 1999
Upoc.com å legger muligheten til rette for bedrifter å sende innformasjon om kampanjer og happenings til mobil brukere. Er ledende på mobil markedsføring service i USA

24 Hva tilbyr upoc.com kunden?
Upoc.com har to former for kunder,mobiltelefon brukerer og bedrifter. Bedrifter: Upoc.com tilbyr bedrifer direkte kontakt med kunder Bedrifter har mulighet til å informere og påvirke kundene til en hver tid.

25 Hva tilbyr upoc.com kunden?
Mobiltelefon brukere Får tilgang til gratis informasjon om valgte interesse områder. Man kan sende gratis innformasjon og tekst meldinger til andre mobiltelefoner.

26 Eksempel 1

27 Eksempel 2

28 Markedet? 58% av amerikanerne fra 12 år og oppover eier en mobiltelefon. Dette er i kontinuerlig vekst. I USA vil det i løpet av året bli sendt ca 6,4 billioner SMS meldinger.

29 Hvordan tjener upoc.com penger?
Bedrifter betaler for mobil markedaservice Upoc.com legger forholdene til rette for bedrifter å nå kunden Kunder tar i mot informasjon Det er bedriftene upoc tjener penger på, men det hadde ikke vært mulig uten mobiltelefon brukerne.

30 Konklusjon Begge er ledene i markedet på sitt område
Begge har gratis tjenester for medlemmer Begge er reklamefinnasiert Begge fokuserer på kundetilpassert informasjon Upoc.com er spasialisrt på M- commerce Bolt.com går på tvers av plattformen.

31 Return to Lecture Summary on Security

32 The E-commerce Security Environment
Page 234, Figure 5.2 Copyright © 2002 Pearson Education, Inc.

33 Dimensions of E-commerce Security
Page 235, Table 5.1 Copyright © 2002 Pearson Education, Inc.

34 The Tension Between Security and Other Values
Ease of use The more security measures that are added to an e-commerce site, the more difficult it is to use and the slower the site becomes, hampering ease of use. Security is purchased at the price of slowing down processors and adding significantly to data storage demands. Too much security can harm profitability, while not enough can potentially put a business out of business. Copyright © 2002 Pearson Education, Inc.

35 Vulnerable Points in an E-commerce Environment
Page 239, Figure 5.4 Copyright © 2002 Pearson Education, Inc.

36 Examples of Malicious Code
Page 241 Table 5.2 Copyright © 2002 Pearson Education, Inc.

37 Tools Available to Achieve Site Security
Page 247, Figure 5.5 Copyright © 2002 Pearson Education, Inc.

38 Public Key Cryptography - A Simple Case
Page 251, Figure 5.6 Copyright © 2002 Pearson Education, Inc.

39 Public Key Cryptography with Digital Signatures
Page 252, Figure 5.7 Copyright © 2002 Pearson Education, Inc.

40 Digital Certificates and Public Key Infrastructure
Page 255, Figure 5.9 Copyright © 2002 Pearson Education, Inc.

41 Secure Negotiated Sessions Using SSL
Page 259, Figure 5.10 Copyright © 2002 Pearson Education, Inc.

42 Securing Channels of Communications
Secure Hypertext Transfer Protocol (S-HTTP) is a secure message-oriented communications protocol designed for use in conjunction with HTTP. Cannot be used to secure non-HTTP messages Virtual Private Networks (VPN) allow remote users to securely access internal networks via the Internet, using Point-to-Point Tunneling Protocol (PPTP) PPTP is an encoding mechanism that allows one local network to connect to another using the Internet as a conduit Copyright © 2002 Pearson Education, Inc.

43 Firewalls and Proxy Servers
Page 262, Figure 5.11 Copyright © 2002 Pearson Education, Inc.

44 Developing an E-commerce Security Plan
Page 264, Figure 5.12 Copyright © 2002 Pearson Education, Inc.


Laste ned ppt "ECheck and eCheckSecure"

Liknende presentasjoner


Annonser fra Google