set protocol is also known as the "Secure Electronic Transaction Protocol"; this protocol came into being to achieve more complete instant electronic payments. It was jointly developed by "Master Card" and Visa, Netscape, Microsoft and other companies. A new electronic payment model launched on June 1, 1997 to secure online purchases using credit cards on open networks.
The operating environment of this tutorial: Windows 10 system, DELL G3 computer.
The SET protocol came into being in order to achieve more complete instant electronic payment. SET protocol (Secure Electronic Transaction), known as the secure electronic transaction protocol, is a new electronic transaction protocol launched on June 1, 1997 by Master Card and Visa in conjunction with Netscape, Microsoft and other companies. Payment model. The SET protocol is designed based on the credit card payment model on B2C. It ensures the security of online shopping using credit cards on the open network. SET is mainly designed to solve credit card transactions between users, merchants, and banks. It has various advantages such as ensuring the integrity of transaction data and non-repudiation of transactions. Therefore, it has become a recognized international standard for credit card online transactions. .
Brief introduction:
SET Protocol
While e-commerce provides opportunities and convenience, it also faces one of the biggest challenges. That is, transaction security issues. In an online shopping environment, cardholders hope to keep their account information confidential during transactions to prevent it from being misappropriated; merchants hope that customer orders cannot be repudiated, and during the transaction process, all parties to the transaction hope to verify The identity of other parties to prevent being deceived. In response to this situation, the two major credit card organizations in the United States, Visa and MasterCard, and many international technology institutions jointly formulated security standards for online transactions based on bank cards that are applied to the Internet. This is "secure electronic transactions" ( Secure Electronic Transaction, referred to as SET). It uses public key cryptography and the X.509 digital certificate standard, and is mainly used to ensure the security of online shopping information.
Since SET provides authentication between consumers, merchants and banks, it ensures the security, complete reliability and non-repudiation of transaction data, especially ensuring that consumers’ bank card numbers are not exposed to Merchants and other advantages. Therefore, by 2012, it became the recognized international security standard for online credit/debit card transactions.
SET (Secure Electronic Transaction) secure electronic transaction protocol is mainly used to ensure the security of payment information in the B to C model. The SET protocol itself is relatively complex, has a strict design, and is highly secure. It can ensure the confidentiality, authenticity, integrity, and non-repudiation of information transmission. The SET protocol is a typical implementation under the PKI framework and is constantly being upgraded and improved. For example, SET 2.0 will support debit card electronic transactions.
The goals of this protocol:
1. Prevent data from being stolen by illegal users and ensure the safe transmission of information on the Internet.
2. SET uses a dual signature technology to ensure the mutual isolation of e-commerce participant information. The customer's information is encrypted and reaches the bank through the merchant, but the merchant cannot see the customer's account and password information.
3. Solve the problem of multi-party authentication. It not only authenticates customers’ credit cards, but also authenticates online merchants to achieve mutual authentication between customers, merchants and banks.
4. Ensure the real-time nature of online transactions and make all payment processes online.
5. Provide an open standard, standardize protocols and message formats, and promote compatibility and interoperability of software developed by different manufacturers. It can be executed on different software and hardware platforms and is widely accepted around the world.
For more related knowledge, please visit the FAQ column!
The above is the detailed content of What is the set protocol also called?. For more information, please follow other related articles on the PHP Chinese website!