Security issues of application layer protocols

Source: Internet
Author: User

Some of our commonly used network applications, such as e-commerce, are implemented at the network application layer. So how can we ensure security in the application layer protocol? In this regard, we will mainly discuss the SET protocol. First, let's take a look at the security protocol environment on the Internet.

It is an important issue for e-commerce to handle e-commerce on the Internet and ensure the security of data transmitted between buyers and sellers. To overcome the disadvantages of SSL security protocols, meeting the ever-increasing security requirements of electronic transactions, in order to meet the transaction security and cost-effective market requirements, the VISA International Organization and other companies, such as Master Card, Micro Soft, and IBM, jointly developed the security Electronic transaction (SET: Secure Electronic Transactions) announcement 。

This is an open, electronic-currency-based electronic payment system specification established for online transactions. It adopts the public key cryptography system and the X.509 digital certificate standard, it is mainly used in B to C mode to ensure the security of the payment information. SET has added the authentication of the merchant's identity while retaining the customer's credit card authentication, this is crucial for transactions that require payment of currency. Due to the reasonable design, the SET application layer protocol has been supported by many large companies and consumers and has become an industrial standard for global networks, its transaction form will become the future "e-commerce" standard 。

1. Description of the SET application layer protocol

The Secure Electronic Transaction specification provides an open standard for secure e-commerce over the Internet. SET uses the electronic authentication technology, and the RSA and DES algorithms are used in the authentication process. Therefore, it can provide strong security protection for e-commerce. It can be said that the SET specification is currently the most important protocol in e-commerce, its launch will certainly greatly promote the prosperity and development of e-commerce. SET will establish a standard for safe use of bank cards for shopping on the Internet. and the rules for providing security measures for electronic transactions, it is a secure electronic payment protocol that can be widely used on the Internet. It can extend the widely used credit card usage starting point from the current store to the consumer's home and to the consumer's personal computer 。

The SET Secure Electronic Transaction protocol is a message stream-based protocol designed for online payment by credit card between users, sellers, and banks, in order to ensure the confidentiality of payment information, the integrity of the payment process, the legitimate identity of the cardholder and operability. The core technologies in SET mainly include public key encryption, digital signatures, digital envelopes, and digital certificates. the working principle and process of the application layer protocol are shown in:

2. The SET application layer protocol has five goals:

(1) ensure that the information of E-commerce participants is isolated from each other. The customer's data is encrypted or packaged after the merchant arrives at the bank, but the merchant cannot see the customer's account and password information;

(2) ensure the secure transmission of information over the Internet and prevent data theft by hackers or internal personnel;

(3) to solve the problem of multi-party authentication, we must not only authenticate the consumer's badge card, but also authenticate the credibility of online stores, at the same time, there are also consumer view, online store and inter-bank authentication;

(4) Ensuring the real-time processing of online transactions and making all payment processes online;

(5) standardized protocols and message formats enable software developed by different manufacturers to have compatibility and interoperability functions and run on different hardware and operating system platforms 。

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.