EC
EC
facilitates online transactions, interaction between users, and various business processes. This
framework helps to ensure the smooth functioning, scalability, security, and efficiency of an E-
Commerce platform. The architecture typically comprises various layers, each serving a specific
function, ranging from user interaction to back-end data processing.
• User Interface: The front-facing component that customers interact with, typically a web
browser or mobile app interface.
• Web Pages and Application Logic: Includes all web pages, images, product listings, search
options, and other components needed to browse and purchase products.
• Technologies Used: HTML, CSS, JavaScript (React, Angular, Vue.js), and mobile app
frameworks (React Native, Flutter).
• Features:
• Business Logic Layer: The core of the system that handles the rules and logic of the E-
Commerce processes. This layer manages:
• Service APIs: These are used to expose functionalities and integrate with external services
(e.g., shipping providers, payment gateways).
• Technologies Used: Backend technologies like Node.js, Python (Django, Flask), Ruby on Rails,
Java (Spring), or .NET.
• Key Functions:
• Key Components:
• Web Server: Manages the web traffic, handles incoming requests from users, and serves the
appropriate web pages or data.
• Load Balancer: Ensures that traffic is distributed evenly across multiple web servers to
prevent overload and maintain high availability.
• Firewall: Protects the system from external threats and unauthorized access.
• SSL/TLS Encryption: Secures all communication between the client and server to protect
sensitive information (e.g., login credentials, payment information).
• CDN (Content Delivery Network): Ensures fast loading times by serving static content (like
images, CSS, JS files) from servers geographically closer to the user.
• Payment Gateways: Connects the platform with financial institutions to facilitate online
payments.
• Shipping and Logistics Services: Integrates with shipping providers to manage delivery
processes and track shipments.
• External Marketing Tools: Integrates with services for email marketing, SMS alerts, and
digital advertising.
• Authentication and Authorization: Secures the system by managing user roles and access
controls.
• Data Encryption: Ensures sensitive data is encrypted both at rest (in databases) and in transit
(during communication).
• Fraud Detection and Prevention: Uses machine learning models to detect anomalies in
transactions and prevent fraud.
• Security Standards: Compliance with data protection laws such as GDPR and industry
standards like PCI DSS for payment security.
• Analytics Engine: Collects and processes data related to user behavior, sales, and traffic for
generating insights.
• Data Backup: Ensures that all critical data is backed up regularly to prevent data loss in case
of failures or cyberattacks.
• Disaster Recovery Plan: Implements strategies for quick recovery from system crashes or
disasters to minimize downtime.
• Supervised Learning: Algorithms are trained on historical transaction data labeled as “fraud”
or “legitimate” to detect similar patterns in real-time. Models like decision trees, random
forests, and neural networks are used to identify fraud based on patterns of abnormal
behavior.
• Deep Learning: Advanced models can identify sophisticated fraud schemes by analyzing
large datasets, improving accuracy in detecting complex fraudulent activities.
2. Rule-Based Systems
• Predefined rules are set based on known fraudulent behavior (e.g., frequent high-value
purchases, mismatched billing and shipping addresses). These rules trigger alerts when
transactions meet suspicious criteria. Rule-based systems can be highly effective but need
continuous updating to keep up with evolving fraud tactics.
3. Behavioral Analytics
• Monitors user behavior on the website, including navigation patterns, device usage, location,
and typing speed. Any deviations from normal user behavior, such as login attempts from
unusual locations or devices, can trigger a fraud alert.
• This tool tracks transactions as they happen, analyzing various aspects such as transaction
amount, geographic location, and device ID. Real-time systems can flag unusual or high-risk
transactions for manual review before processing.
• Encryption ensures that sensitive data (like credit card numbers) is secured during
transmission. Tokenization replaces sensitive information with unique identifiers (tokens),
preventing fraudsters from accessing real payment details if a breach occurs.
• Each transaction is assigned a risk score based on several factors such as payment method,
geographic location, and purchasing history. Transactions with higher scores are flagged for
review or rejection. These models can be built using statistical techniques and machine
learning.
• This technique tracks the geographic location of users through IP addresses and flags
transactions that are unusual based on the user's typical location. It can prevent fraud arising
from account takeovers or phishing attacks.
9. Biometric Authentication
• Uses fingerprint, facial recognition, or voice recognition technology to verify users. This
technique is particularly effective in reducing fraud in mobile commerce (m-commerce)
transactions and preventing unauthorized access to accounts.
1. Content Caching: CDNs store copies of static content like images, CSS, JavaScript files, and
videos in multiple servers worldwide, reducing load on the origin server.
2. Reduced Latency: By delivering content from a nearby server, CDNs reduce the time it takes
for web pages to load, improving performance.
3. Scalability: CDNs handle large volumes of traffic and spikes by distributing requests across
many servers, preventing overload on a single server.
4. Improved Security: CDNs offer protection against Distributed Denial of Service (DDoS)
attacks and can include encryption, secure token-based authentication, and firewall
protection.
Popular CDN providers include Cloudflare, Akamai, Amazon CloudFront, and Fastly.
➢ Anycast is a network addressing and routing method where multiple servers or devices share
the same IP address, and data is routed to the nearest or best-performing server based on
factors like geographic proximity or network conditions. Unlike unicast (one-to-one) or
multicast (one-to-many), anycast is a one-to-one-of-many model, meaning the client is
connected to the closest available server in a distributed network.
1. Reduced Latency: By routing traffic to the nearest server, Anycast improves response times
and speeds up data delivery.
2. Load Balancing: Traffic is distributed across multiple servers, preventing any single server
from being overwhelmed.
3. Increased Resilience: If one server goes down, traffic is automatically rerouted to the next
nearest server, enhancing network reliability and availability.
Anycast is commonly used in CDNs, DNS services, and DDoS mitigation to improve network
performance and security.
> The E-Commerce Trade Cycle refers to the stages a typical online transaction goes through, from
the initial interaction between buyer and seller to the completion of the sale. It encompasses all the
processes involved in buying and selling goods or services online. The cycle is divided into several key
phases:
1. Pre-Sale Phase
• Search and Discovery: The buyer browses products or services on an e-commerce platform,
using search engines, product categories, or recommendations.
• Selection and Comparison: The buyer evaluates different options, compares prices, reviews,
and features, and chooses the desired product or service.
• Negotiation: Some platforms allow for discounts, coupons, or personalized offers that the
buyer can apply before purchase.
2. Purchase Phase
• Order Placement: The buyer selects the product, specifies quantities, and adds the item to
the cart. They provide necessary information like shipping address and billing details.
• Payment: The buyer makes the payment using an online payment method such as credit
cards, digital wallets, or direct bank transfers. The payment gateway verifies the transaction
and processes it.
• Order Confirmation: The seller confirms the order, generates an invoice, and provides
estimated delivery times to the buyer.
3. Post-Purchase Phase
• Order Fulfillment: The seller processes the order, packs the product, and arranges shipping.
The buyer is notified of the shipping status through tracking updates.
• Delivery: The product is delivered to the buyer’s specified address, and the transaction is
completed. In case of a service, it is delivered digitally or through other channels.
• After-Sales Service: The seller may offer after-sales support, including warranty, returns, or
customer service in case of issues or dissatisfaction with the product.
• Customer Feedback: After receiving the product, the buyer can leave a review or rate their
experience, helping future buyers make informed decisions.
• Data Analysis: The seller analyzes the transaction and customer behavior to optimize future
sales, refine marketing strategies, and improve customer satisfaction.
This trade cycle ensures a seamless process from product discovery to post-sale services, optimizing
the customer experience and driving e-commerce efficiency.
➢ SSL (Secure Sockets Layer) is a standard security protocol used to establish an encrypted link
between a web server and a browser. It ensures that all data transferred between the server
and the browser remains private and secure, protecting sensitive information such as credit
card numbers, login credentials, and personal data from being intercepted by malicious
actors.
1. Data Encryption: SSL encrypts the data exchanged between a server and a client, ensuring
that sensitive information is unreadable to anyone attempting to intercept the
communication.
2. Authentication: SSL provides server authentication, ensuring that the website is legitimate
and not an imposter site designed to steal data (phishing).
3. Data Integrity: SSL ensures that the data sent between the server and the client is not
altered during transmission, protecting against tampering.
1. SSL Handshake: When a browser attempts to connect to a website, the server sends a copy
of its SSL certificate to the browser. The browser verifies the certificate, and if it is valid, both
parties agree on encryption keys to use during the session.
2. Encrypted Connection: Once the handshake is complete, data is encrypted before being
transmitted between the browser and the server.
1. Customer Initiates Payment: The process starts when a customer selects items, proceeds to
checkout, and enters payment details, such as credit/debit card information or other digital
payment options like e-wallets.
2. Encryption of Data: Once the payment information is entered, the payment gateway
encrypts the data, ensuring that sensitive details are securely transmitted between the
customer’s browser and the merchant’s server.
3. Transaction Request to Payment Processor: The payment gateway sends the encrypted
transaction data to the payment processor (or acquiring bank) on behalf of the merchant.
The payment processor handles the communication with the card networks (Visa,
MasterCard, etc.).
4. Authorization Request: The payment processor forwards the transaction details to the
customer’s issuing bank (the bank that issued the credit or debit card) to request
authorization. The issuing bank checks the validity of the card, the availability of funds, and
any potential fraud signals.
5. Authorization Response: The issuing bank sends back a response code indicating whether
the transaction is approved or declined. If approved, the authorization code is sent back to
the payment processor and payment gateway.
6. Confirmation to Merchant and Customer: The payment gateway notifies both the merchant
and the customer of the successful or failed transaction. The customer sees a confirmation
page, and the merchant can proceed with fulfilling the order.
7. Settlement and Fund Transfer: Once the transaction is authorized, the funds are transferred
from the customer’s bank account or card to the merchant’s acquiring bank. Settlement
usually happens within a few days, after which the funds are deposited into the merchant’s
account.
• Encryption: Protects sensitive data like credit card information during transmission.
• Authorization: Verifies whether the customer has sufficient funds and the transaction is
valid.
• Settlement: Ensures the funds are transferred from the customer to the merchant.
• Fraud Detection: Many payment gateways include fraud prevention tools, such as address
verification (AVS) and card verification value (CVV) checks.
• PayPal
• Stripe
• Razorpay
• Square
➢ L1, L2, and L3 refer to different levels of customer support or IT service escalation. Each level
has varying degrees of expertise, responsibility, and problem-solving capabilities.
• Scope: L1 support is the first line of defense, handling basic issues that do not require deep
technical knowledge.
• Responsibilities:
o Answering customer queries and resolving common issues, such as login problems,
password resets, and basic troubleshooting.
o Gathering and logging details about more complex issues before escalating.
• Skills: L1 technicians typically have a general understanding of the systems and software
being used but rely on checklists or scripts for problem-solving.
• Escalation: If the issue cannot be resolved at this level, it is passed to L2 for deeper
investigation.
• Scope: L2 support handles more in-depth technical problems that L1 cannot solve. These
technicians have greater technical knowledge and can perform more complex tasks.
• Responsibilities:
• Skills: L2 support requires strong technical skills and knowledge about system architecture,
applications, and databases. They might also engage directly with engineers or developers to
address specific problems.
• Escalation: If the problem is too complex or requires deeper system changes, it is escalated
to L3.
• Scope: L3 support is the highest level of technical expertise, often involving engineers,
developers, or subject matter experts (SMEs). L3 handles the most complex, critical, and rare
issues.
• Responsibilities:
Summary:
• L3: Highest level, handling critical or complex issues (system changes, code fixes).
➢ An electronic market is an online platform where buyers and sellers can engage in
transactions of goods and services. Unlike traditional physical markets, electronic markets
operate in a virtual space, enabling participants to interact and trade from anywhere with
internet access. These markets are typically facilitated through websites or apps, providing a
wide range of products and services.
1. Convenience: Buyers and sellers can engage in transactions 24/7 without the need for
physical presence, offering a high level of convenience.
3. Cost Efficiency: Electronic markets often reduce transaction and operational costs for both
buyers and sellers by eliminating the need for physical infrastructure.
4. Variety: Users can access a vast range of products and services, often with the ability to
compare prices, features, and reviews instantly.
5. Automation: Processes like order management, payments, and inventory updates are often
automated, improving efficiency.
Examples of electronic markets include e-commerce platforms like Amazon, Alibaba, eBay,
➢ EDI (Electronic Data Interchange) is a technology used to exchange business documents
between organizations in a standardized electronic format. It replaces traditional paper-
based communications like purchase orders, invoices, shipping notices, and payment
transactions with automated, digital processes, improving efficiency, accuracy, and
transaction speed.
EDI Documents:
EDI documents are structured files that follow predefined standards, ensuring that data exchanged
between different companies can be easily understood and processed by their respective systems.
Commonly used EDI documents include:
1. Purchase Order (EDI 850): A document sent from a buyer to a supplier to request goods or
services.
2. Invoice (EDI 810): Sent by a supplier to a buyer, providing details of products or services
supplied and the amount owed.
3. Advance Shipping Notice (EDI 856): Sent by the supplier to inform the buyer about the
shipment of goods, including details like shipping date and tracking number.
4. Purchase Order Acknowledgement (EDI 855): A response from the supplier confirming the
receipt of a purchase order and indicating whether it will be fulfilled.
5. Payment Order/Remittance Advice (EDI 820): A document sent by a buyer to a supplier that
authorizes the transfer of funds for a purchase.
These documents are sent between trading partners through secure networks using standardized
formats, such as ANSI X12 (commonly used in North America) or EDIFACT (used internationally).
Evolution of EDI:
The evolution of EDI is a reflection of the advancements in technology and business communication
over several decades:
• Origins: EDI began in the 1960s with the development of early systems for businesses to
share essential documents electronically, mainly in the transportation industry. The need for
standardized data formats arose to allow different organizations’ systems to communicate
seamlessly.
• Initial Adoption: Industries such as transportation, retail, and manufacturing were the first to
adopt EDI to automate business transactions like shipping instructions and invoices.
2. Standardization (1970s–1980s)
• First Standards: In the late 1970s and early 1980s, the first EDI standards were developed,
such as the ANSI X12 standard in North America and the EDIFACT standard internationally.
These standards established common formats for various business documents.
• Wider Adoption: As businesses realized the cost savings and efficiency improvements, EDI
began spreading to industries beyond transportation, including retail and healthcare, where
large volumes of transactions required automation.
3. Networking (1980s–1990s)
• VANs (Value Added Networks): During the 1980s and 1990s, companies began using VANs
to exchange EDI documents. VANs acted as intermediaries that ensured secure and reliable
communication between trading partners.
• Growth of Internet-Based EDI: With the rise of the Internet in the 1990s, EDI started moving
away from expensive private networks (VANs) to more cost-effective Internet-based
solutions. Secure communication methods like AS2 (Applicability Statement 2) emerged,
allowing companies to exchange EDI messages over the Internet.
• Web-Based EDI: As businesses became more global and technology advanced, web-based
EDI solutions emerged, making EDI more accessible to smaller businesses. Cloud-based
platforms simplified EDI implementations by reducing the need for complex infrastructure.
• Integration with ERP Systems: Modern EDI systems are now often integrated with Enterprise
Resource Planning (ERP) systems, such as SAP or Oracle, allowing seamless data flows
between internal business processes and external trading partners.
• API Integration: The rise of APIs (Application Programming Interfaces) has introduced new
methods of data exchange, complementing traditional EDI by offering real-time
communication and more flexible data exchange formats like XML and JSON.
5. Future Trends
• Hybrid EDI Solutions: Many organizations now use hybrid solutions that combine traditional
EDI with APIs to allow more flexibility in data exchange, especially with partners who may
not have full EDI capabilities.
• Blockchain and EDI: Blockchain technology is being explored to provide additional security,
transparency, and traceability in the exchange of EDI documents, particularly in industries
like supply chain management.
Benefits of EDI:
• Cost Savings: Automating the exchange of documents reduces labor costs, paper usage, and
postage.
• Accuracy: Standardized formats and automation minimize the chances of human error in
data entry.
o Examples:
1. Encryption:
o TLS encrypts the data transmitted between the client and server, ensuring that even
if the data is intercepted, it cannot be read by unauthorized parties. This encryption
protects sensitive information, such as login credentials and personal data.
2. Authentication:
o TLS provides a mechanism for both the client and server to authenticate each other.
Typically, the server presents a digital certificate issued by a trusted Certificate
Authority (CA) to verify its identity. This helps prevent man-in-the-middle attacks.
3. Integrity:
o TLS uses cryptographic hash functions to ensure data integrity. This means that any
alteration of the transmitted data can be detected, ensuring that the data received is
the same as what was sent.
4. Forward Secrecy:
o Modern implementations of TLS support forward secrecy, meaning that session keys
are not derived from the server's long-term keys. Even if the long-term keys are
compromised, past session keys remain secure.
How TLS Works
1. Handshake Process:
▪ Client Hello: The client sends a "hello" message to the server, including the
TLS version it supports, the cipher suites (encryption algorithms) it can use,
and a randomly generated number.
▪ Server Hello: The server responds with its chosen TLS version, selected
cipher suite, and its own randomly generated number.
▪ Certificate Exchange: The server sends its digital certificate to the client,
which includes its public key.
▪ Key Exchange: The client generates a pre-master secret, encrypts it with the
server's public key, and sends it to the server. Both parties then generate
session keys from the pre-master secret.
▪ Finished Messages: Both client and server send a message indicating that
the handshake is complete and that future messages will be encrypted.
2. Data Transmission:
o Once the handshake is complete, the client and server use the session keys to
encrypt and decrypt the data they exchange. This ensures that the communication
remains secure throughout the session.
3. Session Termination:
o At the end of the communication, the client and server can terminate the TLS
session. The session keys are discarded, ensuring that future sessions will have
different keys for added security.
• Secure Web Browsing (HTTPS): TLS is most commonly used to secure communication
between web browsers and servers, indicated by "HTTPS" in the URL.
• Email Security: Protocols like SMTPS, IMAPS, and POP3S use TLS to encrypt emails during
transmission.
• VPNs (Virtual Private Networks): TLS can be used to secure connections in VPNs, protecting
data transmitted over insecure networks.
1. Data Protection:
o Tokenization reduces the risk of data breaches by replacing sensitive data with
tokens that have no meaningful value. Even if an unauthorized party gains access to
the tokens, they cannot derive any useful information from them.
3. Reversibility:
o The process is reversible, meaning that tokens can be converted back to the original
sensitive data through a secure tokenization system or database. Only authorized
personnel can perform this operation.
4. Compliance:
1. Data Submission:
o When sensitive data (e.g., credit card numbers) is submitted, the tokenization system
captures this information.
2. Token Generation:
o The sensitive data is then replaced with a randomly generated token, which is a
unique identifier. This token is stored in a secure tokenization database along with a
reference to the original data.
3. Data Storage:
4. Token Usage:
o The token can be used in place of the original data for various purposes, such as
processing payments or conducting transactions. Since the token has no inherent
value, it can be shared or used without risking exposure of the sensitive data.
5. Data Retrieval:
o When the original data is needed (e.g., to complete a transaction), the tokenization
system references the secure database to retrieve the original sensitive data and
provide it to authorized users or systems.
1. Payment Processing:
2. Data Storage:
3. Cloud Computing:
4. Healthcare:
o Card on File refers to the storage of card details (like card number, expiration date,
and CVV) by merchants or payment service providers for future transactions. This
practice enables faster and more convenient transactions for customers.
o Encryption: If merchants must store card details, they should use strong encryption
methods to protect the data both in transit and at rest.
3. Regulatory Compliance:
o Merchants and payment processors must comply with PCI DSS (Payment Card
Industry Data Security Standard) requirements to ensure the secure handling of
cardholder data.
o Regular audits and assessments should be conducted to verify compliance with
security standards.
4. Customer Consent:
o Prior explicit consent from customers must be obtained before storing their card
details. Customers should be informed about how their data will be used and the
security measures in place to protect it.
5. Access Controls:
o Access to stored card data should be restricted to authorized personnel only. This
helps minimize the risk of unauthorized access or data breaches.
6. Notification of Changes:
o Customers must be informed in case of any changes to their stored card information
or if a tokenized card is re-issued. This includes changes in card validity or other
related information.
7. Data Retention:
o The guidelines specify a maximum retention period for stored card data. Merchants
should not keep card details longer than necessary for the intended purpose.
8. Transaction Alerts:
1. Setup:
o Users can add their credit or debit card information to the Wallet app on their Apple
devices by taking a photo of the card or manually entering the details. Verification
with the bank may be required.
2. Making Payments:
o For in-store payments, users simply hold their device near a compatible contactless
payment terminal and authenticate the transaction using Face ID, Touch ID, or a
passcode.
o For online or in-app purchases, users can select Apple Pay as their payment option,
review the payment details, and confirm the transaction.
3. Transaction Confirmation:
o Upon successful payment, users receive a confirmation notification, and the
transaction details can be viewed in the Wallet app.
• Retail Payments: Users can make purchases at participating retailers and restaurants using
their Apple devices.
• Online Shopping: Apple Pay is accepted by many online merchants and can be used for
purchases on websites and in apps.
• In-App Purchases: Users can make seamless in-app purchases without needing to enter
payment information.
• Peer-to-Peer Transactions: Apple Cash allows for easy transfers of money between
individuals.
OEM (Original Equipment Manufacturer) refers to a company that produces parts or equipment that
may be marketed by another manufacturer. In the context of technology and consumer electronics,
OEMs typically create components, devices, or software that are then rebranded and sold by another
company under its own brand name.
1. Component Production:
o OEMs design and manufacture products or parts that are integrated into a larger
system or sold as standalone products. For example, an OEM might produce
computer hardware, such as motherboards, hard drives, or graphics cards.
2. Branding:
o The products made by an OEM are often sold under the brand name of another
company. For instance, a company may source its hardware from an OEM but sell it
under its own label, adding value through branding and marketing.
3. Collaboration:
o OEMs often collaborate closely with the companies they supply, providing
customized solutions that meet specific requirements and quality standards.
4. Cost Efficiency:
5. Expertise:
o An OEM works with the client company to design and develop products that meet
specific technical specifications and requirements.
2. Manufacturing:
3. Quality Control:
o OEMs implement strict quality control measures to ensure that the products meet
the required standards before they are shipped to the client.
4. Distribution:
o Once produced, the OEM supplies the finished products or components to the client
company, which then markets and sells them under its brand name.
Examples of OEM
1. Computer Hardware:
o Companies like Foxconn and Quanta Computer are OEMs that manufacture
computer components for major brands like Apple and HP.
2. Automotive Industry:
o In the automotive sector, companies like Bosch and Denso produce components
(such as engines and electronic systems) for various automobile manufacturers.
3. Consumer Electronics:
Network Token
A network token is a secure, unique identifier assigned to a payment card or account, replacing the
actual card details during transactions. This tokenization process helps enhance payment security by
ensuring that sensitive card information is not transmitted or stored during transactions, minimizing
the risk of fraud and data breaches. Network tokens are generated by payment networks (like Visa or
Mastercard) and can be used for various transactions, both in-store and online, allowing for seamless
payments without exposing actual card data.
Stakeholders in Tokenization
o Individuals who own payment cards and benefit from enhanced security and privacy
through the use of tokens instead of actual card details.
2. Merchants:
o Businesses that accept card payments. They benefit from tokenization as it reduces
the risk of handling sensitive card information and helps in minimizing chargebacks.
3. Payment Processors:
o Companies that facilitate payment transactions between merchants and banks. They
implement tokenization technology to securely process payments.
4. Issuing Banks:
o Financial institutions that issue credit or debit cards to consumers. They are
responsible for managing the relationship with cardholders and ensuring the secure
generation and management of tokens.
5. Payment Networks:
o Organizations like Visa, Mastercard, and American Express that provide the
infrastructure for electronic payments. They develop and maintain the tokenization
framework and standards.
o Specialized entities that manage the generation, distribution, and lifecycle of tokens.
They ensure that tokens are securely created, mapped to original card data, and
properly managed throughout their use.
A Token Service Provider (TSP) is an organization or entity that offers services related to the
generation, management, and security of tokens used in payment transactions. TSPs play a critical
role in the tokenization ecosystem by providing the necessary infrastructure and services to enable
secure payment processing.
1. Token Generation:
o TSPs generate unique tokens that replace sensitive card details for secure
transactions. This process involves mapping the token to the original card data
stored securely.
2. Token Management:
o TSPs manage the lifecycle of tokens, including their creation, activation, deactivation,
and renewal, ensuring that tokens are used securely and effectively.
3. Security:
o TSPs implement robust security measures to protect token data and ensure
compliance with industry standards like PCI DSS (Payment Card Industry Data
Security Standard).
4. Integration:
o TSPs provide APIs and tools that facilitate the integration of tokenization into
merchants' payment systems, enabling seamless transactions without compromising
security.
5. Data Mapping:
o They maintain a secure mapping of tokens to original card data, allowing for
transactions to be processed without exposing sensitive information.
Transaction refers to the sequence of steps that occur from the moment a customer initiates a
payment until the funds are transferred and the transaction is completed.
o The customer selects products or services and proceeds to checkout, entering their
payment details (credit/debit card information).
o The merchant's website or point-of-sale (POS) system collects the customer's card
information. If tokenization is used, the card details may be replaced with a token.
o The merchant sends the payment information to a payment gateway (a service that
authorizes credit card payments) for processing.
o The payment gateway validates the transaction details (like card number, expiration
date, CVV) and checks for fraud indicators.
o The payment gateway forwards the transaction request to the acquiring bank
(acquirer) for approval. The acquirer is the financial institution that processes card
payments on behalf of the merchant.
o The card issuer receives the transaction request, checks the customer’s account for
available funds, and assesses fraud risk. The issuer then either approves or declines
the transaction.
o The card issuer sends the authorization response back to the card network, which
forwards it to the acquirer.
o The acquirer sends the authorization response to the payment gateway, indicating
whether the transaction was approved or declined.
o The payment gateway notifies the merchant of the transaction status. If approved,
the merchant can proceed with fulfilling the order.
o For approved transactions, the funds are transferred from the customer’s account to
the merchant’s account through the acquirer. This process may take a few days to
settle fully.
o The customer receives a confirmation of the transaction, typically via email or in-app
notification.
1. Convenience:
2. Speed:
3. Global Reach:
4. Enhanced Security:
o Electronic payments often utilize advanced security measures, such as encryption
and tokenization, to protect sensitive financial information, reducing the risk of fraud
and data breaches.
5. Cost Efficiency:
o Electronic payments can reduce transaction costs associated with handling cash,
checks, or manual processing. This efficiency benefits both consumers and
merchants.
6. Record Keeping:
7. Payment Flexibility:
o Consumers can choose from various electronic payment methods, including credit
cards, debit cards, mobile wallets, and online banking, providing them with flexibility
in how they pay.
o A set of security standards designed to ensure that all companies that accept,
process, store, or transmit credit card information maintain a secure environment.
o Protocols used to secure data transmitted over the internet. SSL and TLS encrypt
communication between a user's browser and a web server, ensuring that sensitive
payment information remains confidential.
o An authentication protocol that adds an additional layer of security for online card
transactions. It often requires the cardholder to complete a verification step during
the checkout process.
o A global standard for credit and debit cards that use embedded microchips to
enhance security. EMV cards are more difficult to clone than traditional magnetic
stripe cards.
6. Tokenization Protocols:
8. ISO 20022: