Font Size: a A A

The Research On Security Technology In Electronic Commerce

Posted on:2007-02-14Degree:MasterType:Thesis
Country:ChinaCandidate:W TanFull Text:PDF
GTID:2178360212966751Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
As the Internet developing, the electronic commerce a union product of the network and the commerce is approaching the people's everyday living and more and more arouses more people's interest. However, Internet is openness and anonymous, it has many securities danger inevitably. In the on-line transaction, each kind of hacker attack is threatening the transaction security seriously. In the electronic commerce, security is the core which must be considered.,namely should guarantee the request that electronic transaction based on the Internet has the same security like traditional transaction way,network should be able to provide the safe solutionFirst, this paper introduces the security technology frame in the present electronic transaction from the data encryption technology, the status authentication technology, the PKI technology, the security electronic transaction protocol, the access control technology aspects. After that has been carrying on comparative analysis and improvement in the third chapter to the electronic commerce related technology. Has been analyzing two current main securities protocol the SSL protocol and the SET protocol, point out their good and bad points and the applicable scope, exhaustively comparison between two protocols'differences; Has been comparing American federation PKI and the Canadian PKI system, and discussed the structure of CA bridge authentication of our country; Specially aiming at the shortcoming of present domestic CA authentication, boldly proposed the idea network notarization, the authoritative national proof power is introduced to virtual network world, the implementation network notarization fills network world legal vacuum, has solved the electronic commerce security and the credit question; Finally I has carried on profound analysis and comparison in the fourth chapter to the bank card on-line payment safe authentication pattern, has analyzed bank card on-line payment standard 3-D Secure and Secure Code which are promoted by Visa and MasterCard respectively, has analyzed two kind of authentication patterns in the domestic, they are bank payment gateway and the third party payment gateway,and has given a detailed elaboration and analysis to every transaction flow respectively.
Keywords/Search Tags:data encrypt, security protocol, cybernotary, on-line payment
PDF Full Text Request
Related items