How to improve the success rate of payment build a safe and trustworthy website

Source: Internet
Author: User
Keywords nbsp; security logo server provide

One, the construction website trustworthiness system

Traditional business activities are conducted face-to-face, and both parties can easily build trust and create a sense of security. And online sales is the exchange of information between buyers and sellers through the Internet, information technology means to make lawless opportunities, which makes e-commerce transactions both sides in a sense of security and trust in the degree of doubt. Any company that operates online sales of business operators must establish a sound online integrity system and security measures. When customers browse your site, that the quality of products, reputation and services are first-class, and have a sound online integrity system and security measures, will be assured to go shopping. This can be from the following several aspects to increase the credibility of the site, so that consumers can be assured to do shopping.

1 Website content Information integrity and true credibility, E-commerce site must provide "about us", "Contact Us", "User Feedback", "questions and Answers" and other columns.

2 Professional Standard website design, site navigation Clear, timely update consultation and provide product or transaction-related information.

3 in the site of the prominent location listed personal information Privacy statement (such as privacy protection Provisions), and make commitments and explanations.

4 for online payment, clearly explain how to protect credit card information.

5 List The service terms and conditions in the prominent position of the website and give examples.

6 clearly state all charges and specify the amount of charges and the manner and time of the charges.

7 The Customer service consultation to respond quickly, to provide online service system.

8 when the customer order is completed, send the transaction confirmation email or electronic order to the customer.

9 the articles published on the website clearly explain the author and source, avoid linking to unrelated or low-quality sites.

10 provide a refund commitment, and specify the conditions for cancellation and refund.

11 to show the customer the quality of your product or service and do it during the transaction.

12 provide customers with the exchange of community and customer feedback after the shopping list, so that new consumers get the necessary information.

Both sides of E-commerce are confronted with the threat of information security. These information fraud threats are divided into sellers ' security threats and buyer's security threats.

1. Information security threats faced by sellers

For example, the name of counterfeit legal users to change the content of business information, resulting in the interruption of e-commerce activities, resulting in business reputation and user interests and other aspects of the damage; a malicious competitor pretends to order merchandise or invade the network to gain marketing information and customer information; Information spies steal trade secrets by technology; Produce a large number of false orders crowding out the system resources, so that it can not respond to normal business operations.

2. Information security threats faced by buyers

If the identity information of the user is intercepted and stolen, to be asked to pay or return goods, domain information is monitored and spread, forced to receive a lot of useless information or even personal privacy is leaked, the business information sent is not complete or tampered with, the user can not receive the goods, false advertising information misleading purchase counterfeit goods or cheated money , computer equipment failure causes information loss.

Only the information flow, the capital flow, the logistics effective conversion, can guarantee the smooth realization of the electronic commerce, but all this is based on the authenticity of the message. The authenticity of information on the one hand refers to the authenticity of information on both sides of the Internet transaction, on the other hand refers to the authenticity of the identity information on the Internet transactions, that is, the identity of the person or entity to identify, for the authenticity of the identity of the guarantee, so that the two sides of the transaction This means that when a person or entity claims to have a particular identity, the authentication service verifies the correctness of its declaration. Generally can be achieved through certification bodies and certificates. Using e-mail authentication and SMS authentication is a very convenient way of identity authentication.

Consumers have distrust of the site, mainly because the site and the main body does not necessarily contact, anyone can do a website to sell goods, although the vast majority of sites will be published contact information and site operators introduced, but those messages are unverifiable opinion. Once there is a problem, the user simply can not know the real situation behind the site manager. But if through the website domain name registration information and the enterprise actual information mutually verifies, with the authoritative third party information verifies the enterprise the authenticity, tells the user enterprise operator and the website to be consistent, can fundamentally solve the consumer to the website Trust question.

Second, the payment page to be as safe as possible

For consumers, will be more or less to the online shopping have doubts, especially the first time to the business site of new customers, they tend to pay attention to a lot of small details, so as to determine whether the shopping site is authentic. Therefore, the construction of the consumer shopping site, on the page to provide some information, so that consumers are assured that shopping is very necessary. Typically, there are some certification flags on every page of the site, which have flags for the payment security, McAfee flags for system security, and HTTPS protocols for transmission traffic security. Also in the obvious location to provide payment service provider's logo is also very useful, such as PayPal logo.

VeriSign is a leading Secure Sockets Layer (SSL) certification authority that provides security for E-commerce and communications in Web sites, intranets, and extranets. VeriSign protects more than 500000 WEB servers worldwide with powerful encryption capabilities and stringent authentication measures. They choose a trustworthy flag that represents the high security of the Internet and enable the most powerful SSL encryption features for each site visitor, as shown in Figure 6.1.




Figure 6.1 VeriSign Company homepage

More than 93% of the Fortune 500 companies and 40 of the world's largest banks have chosen VeriSign as their SSL certificate provider because they are well aware of the importance of Internet security. The reason they trust VeriSign is due to VeriSign's advanced encryption technology and rigorous business authentication practices.

The VeriSign SSL certificate is one of the most trusted signs on the internet, and most online sales websites have a VeriSign SSL certificate. If your site uses the VeriSign SSL certificate (VeriSign SSL Certificates) and displays the VeriSign Eastdil signature (VeriSign Eastdil Seal), your customers will know that their transactions are safe and secure, and fully trust your website.

In addition, the VeriSign EV server certificate is also a useful security sign, which ensures that you are logged in as a real site to ensure your online security. Note that the URL prefix is definitely HTTPS when the color of the address bar becomes green: the word. The VeriSign server certificate is 512-bit, 1024-bit, 2048-bit, and the mainstream is 1024-bit, with the latest technology being an extensible EV server certificate. An SSL certificate includes a public key and a private key. Public keys are used to encrypt information, and private keys are used to interpret encrypted information. When the browser points to a secure domain, SSL synchronously confirms the server and the client and creates an encryption method and a unique session key. They can initiate a secure session that guarantees the privacy and integrity of messages.

Digital certificate organization through the application of the identity of the server certificate user audit, submit the corresponding company qualification to obtain digital certificates, and phishing Web site is difficult to obtain a secure server certificate. In mainland China VeriSign through its partner Beijing Tianwei Integrity Company responsible for its digital certificate, the applicant can submit the corresponding Chinese qualification to obtain a regular server certificate. With the latest IE 7.0 technology applications, the EV-represented server certificate will dominate. The Web site address bar with the EV server certificate will display a different color to indicate the security level of the site, green means that the security site, red to remind customers to submit information carefully. Therefore, the acquisition of a server certificate can effectively enhance the credibility of the website, to ensure the security of Internet users.

McAfee Flag for system security

In 1997, McAfee Associates was merged with the receptacle general, known for production sniffer, to form Receptacle Associates Inc. (NAI, US Network Alliance). The merged NAI launched the industry's most comprehensive product line, including network protection, management and monitoring. The merger of PGP and Magic FX makes it perfect the product line of network security and management system. With the ' TIS ' (the manufacturer of the famous production firewall) and the first largest anti-virus company in Europe, Dr. With the completion of the acquisition work of 10 companies such as Solomon, Nai has become a leading provider of global network security and management solutions.

McAfee, as shown in Figure 6.2, is a leader in terminal security and network intrusion protection, combined with secure Computing's dominance of web and e-mail security, enabling McAfee to be unique and responsive to the most demanding security challenges of its customers. Enabling users to leverage the most powerful technologies in today's marketplace to consolidate their defenses. At present, 80% of the top 1000 companies in Fortune have adopted McAfee as their patron. Famous enterprises are: IBM, Hotmail, Microsoft (Microsoft), Cisco (Cisco), Hewlett-Packard (HP), Compaq (COMPAQ), AOL, Nokia (Nokia), Ford, Procter and Gamble (P&G), etc. They all chose McAfee.




McAfee logos for system security scans are very common on the Internet, especially for the consumer shopping site, where McAfee's logo represents a regular McAfee security scan, a site that protects against malicious hacking and has perfect system security.

This digest from the "online payment-Network business Success" This book has been officially listed sales, when, excellence, Taobao, the major Xinhua bookstore hot.

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.