In the previous article we talked about the need to use secure protocols to make economic transactions in the online store. We also mentioned the need to consider a few basic requirements to choose a secure payment system: authentication, integrity and non-repudiation. We'll see how difficult it is to meet the three requirements at the same time. With SSL, Secure Sockets Layer, the information travels encrypted so that it cannot be interfered or performed by third parties. SHTTP we have similar characteristics. They are probably most widely used by online stores security protocols. To use either of the two protocols to our shop online has to be installed on a secure server.
The merchant's online store you need certified keys but the client does not. It is a user-friendly method for the customer by its simplicity, but the merchant can come up with the repudiation to the not guaranteed in the process the identity of who makes the purchase online. In some cases and in accordance with which company will install the SSL system, customer may at any time verify the validity of the certificate of the online store domain security, the owner of this certificate and the geographical location of both (web hosting). With SET, Secure Electronic Transaction, is necessary to obtain a Digital certificate issued by a certification authority that will be responsible for certifying that whoever buys it online is who they claim to be. This is a complex system that does not have many followers. The SET Root CA certifies the Brands SET between those American Express Company, Cyber-Comm, JBC Company l., MasterCard International, Nippon Shinpan C.L., PBS International, ASDankort and Visa International found. These entities are responsible for issuing the certificates online stores proprietary traders and proprietary cards customers. The certifications have a cost attached to the tangle of intermediaries involved in everything the process makes SET not very popular (Criacao websites) (Desenvolvimento websites).
PGP, Pretty Good Privacy, is another encryption system widely used, particularly in the transmission of e-mails. It must be installed on the computer of the merchant and buyer's. Generate a public key and private for both. It is a simple as it is not necessary to do anything special. The information travels encrypted and under a few keys. Ensures the identity of the issuer and receiver, the confidentiality and integrity of information and not have place to divorce. Besides the security protocols there are a number of mechanisms to recognize and ensure the identity of the users such as authentication, digital signature and electronic certificate. And there are other means of payment that you can include when designing our store online, such as PayPal, Virtual POS, telephone payments, discuss them upcoming articles. Design online stores.