VII.E Payment System
VII.E Payment System
Characteristics of payment
system
Various characteristics of payment systems include:
Anonymity: It refers to whether the payment model
is anonymous or not. It is concerned with whether a
third party can trace back who was involved in
payment transaction.
Security: This is concerned with whether the
payment method is secured, in particular whether it is
easy to perpetrate different kinds of fraud such as
forged payment.
Overhead cost: This refers to overhead cost of
processing a payment.
Continued……
Transferability: This refers to whether a payment can
be carried out without the involvement of a third party
such as bank.
Divisibility: This refers to whether a payment can be
divided into arbitrary small payments whose sum is
equal to original payment.
Acceptability: This refers to whether the payment
method is supported globally, i.e. not by a closed
group only.
Introduction
E payments are payments that are
made electronically over the
internet . Earlier almost all the
business transactions were done
through cash payments but now IT
revolution has led to the
development of new forms of
payment
Electronic payment system
payment(EFT , e-cash ,e check , e-wallet,micropayment)
Virtual
customer
businessman
product or service
1.Electronic payment system is a financial exchange
that takes place online between buyers and sellers
2.There are different methods to pay electronically like
credit cards , electronic cash etc.
Traditional payment scheme
• Payment(credit card ,cash , check)
customer businessman
• Produce or service
PUT MONEY
SEE
INTO E-
PROPOSAL WALLET
ACCEPT APPROVE
PAYMENT
JOB REQUEST
RELAESE FUNDS
TO PROJECT
FROM WALLET
PEER-2-PEER PAYMENTS
Online financial transfer
through e-mail address.
Reduces risk of fraud &
overdrawn a/c.
Example PayPal services.
E-PAYPAL SYSTEM
It enables the merchants or individuals to withdraw cash
from their PayPal accounts.
Allows customers to send their transaction money
quickly & safe to anyone.
To use it one should must get registered themselves .
E-CASH
Online payments via debit cards, credit cards or smart
card are the examples of e-money transactions.
E Cash is transferred directly from customer’s desktop
to the merchant’s site.
HOW TYPICAL E-CASH SYSTEM
WORKS?
E-CHEQUE
E-Cheque is the result of co-operation between several
banks, government entities, technology companies
and e-commerce organizations.
These can be used for small and large organizations
E-CHEQUE WORKING
ELECTRONIC FUND TRANSFER
It is one of the oldest methods to transfer money.
It is the groundwork of groundless and cheque-less
culture, it is used to transfer money without any paper
money changing hands.
Benefits of EFT
Simplified accounting
Improved efficiency
Reduced administrative costs
Improved security
ENTITIES
PAYER AND PAYEE
PAYER-A Payer is a person who makes the payment.
PAYEE- A Payee is a person who receives payment.
FINANCIAL INSTITUTE AS ISSUER
OR ACQUIRER
The financial institution participates in payment
protocols in two roles- as an issuer and as an
acquirer. The issuer holds payer s’ account and
acquirer holds payee s’ account and assets. The
payee deposits the payment received during a
transaction with the acquirer.
Trustee or Arbiter
Other parties that may be present in a payment
protocol include a Trustee who is an entity that is
independent from all parties . Trustee is asked to
adjudicate any disputes between payer and payee.
PAYMENT GATEWAY
Payment Gateways are the entities that act as a
medium for transaction processing between the
entities ( e.g. mastercard visa) and Certification
authorities (CA) . They issue public key
certificates to entities.
PHASES IN E-PAYMENT
REGISTRATION
The payee must register themselves with the site
of online service providers.
By filling a form and creating user ID.
A Payee can access subscribed billing information
and payments, simply by login his ID.
Invoicing
In this phase, payee obtains an invoice for payment
from the payor .
BENEFITS OF ELECTRONIC PAYMENT SYSTEM
financial management tools through which individuals can pay for numerous
different types of transactions ranging from parking payments to travel tickets pr
global acceptance payments in foreign currency.
2. Universal ●
With electronic payment methods payments can be made over
the phone, on the internet, and through the post and accepted
acceptance everywhere.
3. Greater Electronic payment system is safe and secure as it follows strict encrypted secure
●
system for making payments keeping buyer’s identity and details completely
6. Better control Electronic payment also provides the ability to control payment
●
for goods and services over time by allowing buyers to pay at will
over payments whenever they want or have sufficient funds to make payments.
BENEFITS TO SELLERS
1. Speed and ●
EPS ensure faster processing of transaction from verification and
authorization to clearing and settlement . It reduces the visibility of
security information.
4. Better control prepaid cards can increase internal controls over high volumes .
IPSEC
Internet Protocol Security (IPSec) is a framework of
open standards for ensuring private, secure
communications over Internet Protocol (IP) networks,
through the use of cryptographic security services.
IPSec is a suite of cryptography-based protection
services and security protocols. Because it requires no
changes to programs or protocols, you can easily
deploy IPSec for existing networks.
Continued…
The driving force for the acceptance and deployment
of secure IP is the need for business and government
users to connect their private WAN/ LAN
infrastructure to the Internet for providing access to
Internet services and use of the Internet as a
component of the WAN transport system. As we all
know, users need to isolate their networks and at the
same time send and receive traffic over the Internet.
The authentication and privacy mechanisms of secure
IP provide the basis for a security strategy for us.
Application of IPSEC
Secure branch office connectivity over the Internet
–Secure remote access over the Internet
–Establishing extranet and intranet connectivity with partners
–Enhancing electronic commerce security
However, users have some security concerns that cut across protocol
layers. For example, an enterprise can run a secure, private TCP/IP
network by disallowing links to un trusted sites, encrypting packets
that leave the premises, and authenticating packets that enter the
premises. By implementing security at the IP level, an organization can
ensure secure networking not only for applications that have security
mechanisms but also for the many security-ignorant applications.