search
HomeCommon ProblemWhat is the set protocol also called?

set protocol is also known as the "Secure Electronic Transaction Protocol"; this protocol came into being to achieve more complete instant electronic payments. It was jointly developed by "Master Card" and Visa, Netscape, Microsoft and other companies. A new electronic payment model launched on June 1, 1997 to secure online purchases using credit cards on open networks.

What is the set protocol also called?

The operating environment of this tutorial: Windows 10 system, DELL G3 computer.

What is the set protocol also called?

The SET protocol came into being in order to achieve more complete instant electronic payment. SET protocol (Secure Electronic Transaction), known as the secure electronic transaction protocol, is a new electronic transaction protocol launched on June 1, 1997 by Master Card and Visa in conjunction with Netscape, Microsoft and other companies. Payment model. The SET protocol is designed based on the credit card payment model on B2C. It ensures the security of online shopping using credit cards on the open network. SET is mainly designed to solve credit card transactions between users, merchants, and banks. It has various advantages such as ensuring the integrity of transaction data and non-repudiation of transactions. Therefore, it has become a recognized international standard for credit card online transactions. .

Brief introduction:

SET Protocol

While e-commerce provides opportunities and convenience, it also faces one of the biggest challenges. That is, transaction security issues. In an online shopping environment, cardholders hope to keep their account information confidential during transactions to prevent it from being misappropriated; merchants hope that customer orders cannot be repudiated, and during the transaction process, all parties to the transaction hope to verify The identity of other parties to prevent being deceived. In response to this situation, the two major credit card organizations in the United States, Visa and MasterCard, and many international technology institutions jointly formulated security standards for online transactions based on bank cards that are applied to the Internet. This is "secure electronic transactions" ( Secure Electronic Transaction, referred to as SET). It uses public key cryptography and the X.509 digital certificate standard, and is mainly used to ensure the security of online shopping information.

Since SET provides authentication between consumers, merchants and banks, it ensures the security, complete reliability and non-repudiation of transaction data, especially ensuring that consumers’ bank card numbers are not exposed to Merchants and other advantages. Therefore, by 2012, it became the recognized international security standard for online credit/debit card transactions.

SET (Secure Electronic Transaction) secure electronic transaction protocol is mainly used to ensure the security of payment information in the B to C model. The SET protocol itself is relatively complex, has a strict design, and is highly secure. It can ensure the confidentiality, authenticity, integrity, and non-repudiation of information transmission. The SET protocol is a typical implementation under the PKI framework and is constantly being upgraded and improved. For example, SET 2.0 will support debit card electronic transactions.

What is the set protocol also called?

The goals of this protocol:

1. Prevent data from being stolen by illegal users and ensure the safe transmission of information on the Internet.

2. SET uses a dual signature technology to ensure the mutual isolation of e-commerce participant information. The customer's information is encrypted and reaches the bank through the merchant, but the merchant cannot see the customer's account and password information.

3. Solve the problem of multi-party authentication. It not only authenticates customers’ credit cards, but also authenticates online merchants to achieve mutual authentication between customers, merchants and banks.

4. Ensure the real-time nature of online transactions and make all payment processes online.

5. Provide an open standard, standardize protocols and message formats, and promote compatibility and interoperability of software developed by different manufacturers. It can be executed on different software and hardware platforms and is widely accepted around the world.

For more related knowledge, please visit the FAQ column!

The above is the detailed content of What is the set protocol also called?. For more information, please follow other related articles on the PHP Chinese website!

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools