SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Seminar on
3-D secure password
3-D Secure
  Password
  It is an E-Commerce Application for
  payment System.
 To know about the 3-D Secure password we
  need to know about 3-D and then 3-D Secure.
 3-D Stands for Three Domains here.
 3-D Secure is XML Based Protocol to
  implement the better security to the Credit
  and Debit card Transactions.
 So The Password formed by 3-D Secure
  Protocol is called 3-D Secure Password.
 Three Domains Consist of Three Type of
  Domains.
 The Very First is Acquirer Domain. (The
  Merchant and The Bank to which money is
  being paid).
 The Second is Issuer Domain.(The Bank
  which issued the card being used)
 And Last but certainly not the least is
  Interoperability Domain.(The Infrastructure
  provided by the credit card scheme to
  support the 3-D Secure Protocol)
 It was very firstly developed by the company
  “VISA” and gave the name “Verified by Visa”
  (VBV) .
 Now it is also adopted by the company
  “Master Card” and gave the name “Master
  Card Secure Code” (MCSC).
 It is also being used by the company “JCB
  International” and gave name “J/Secure”
 CUSTOMER
 MERCHANT
 BANK
 INFRASTRUCTURE
 SERVICE OR PRODUCT
 Basically 3-D Secure Password is used to
  provide the better security to the Customers
  for Transactions in the Online Payment
  System.
 For Online Purchasing mostly we have to pay
  Digital Cash so we have to deal online then it
  includes Bank, Merchant and Customer .
  So there is requirement of security from
  Fraud and Money Theft.
 It is being used for removing the Risk over
  the Internet so that customer can feel free in
  doing Online Transactions.
   This protocol uses XML messages sent over SSL
    connections with client authentication (this
    ensures the authenticity of both peers, the
    server and the client, using digital certificates).
   This is a one time process which takes place on
    the card issuer's website and involves the
    cardholder answering several security questions
    to which only the card issuer and cardholder will
    know the answer. The cardholder selects a
    password and agrees on a secret phrase, which
    will be used by the card issuer during each
    online transaction.
   3D Secure can be thought of as an online version
    of “Chip and Pin technology”.
 In order for a Visa or MasterCard member
  bank to use the service, the bank has to
  operate compliant software that supports the
  latest protocol specifications. Once
  compliant software is installed, the member
  bank will perform product integration testing
  with the payment system server before it
  rolls out the system.
 3-D Secure Components
     ACS Providers               MPI Providers
  (Access Control Server)     (Merchant Plug-In)
   In 3-D Secure protocol, ACS (Access Control
    Server) is on the issuer side (banks).
    Currently, most banks outsource ACS to a
    third party. Commonly, the buyer's web
    browser shows the domain name of the ACS
    provider, rather than banks' domain name,
    however this is not required by the protocol.
    Dependent on the ACS provider, it is possible
    to specify a bank owned domain name for
    use by the ACS.
   Each 3-D secure transaction involves two
    simple internet request/response pairs:
    VEReq/VERes and PAReq/PARes. Visa and
    MasterCard don't license merchants for
    sending requests to their servers. They
    isolate their servers by licensing software
    providers which are called MPI (Merchant
    Plug-In) providers.
Transactions flow




                                                   Achieve
                                                   Security


                                       Using 3-D
                                        secure
                                       password

                    Implementation
                     of 3-D secure
                       password


                                 Time spent
REGISTER YOURSELF WITH THE
1   BANK BEFORE SHOPPING.


    DON’T ENTER A PASSWORD TO
2   THE POP Ups.

    BANK MUST PROVIDE THE
3   CUSTOMER THE INLINE
    FRAME(IFRAME).
This implementation curve may be like this……
   Reduction in “Unauthorized Transactions”
    CHARGE BACK.

   More Security and Reliability.

   More Security means more of the Customers
    more if Transactions which is beneficial.

   Authentication
 Decreased Risk of Fraud for Online Payment.
 Better Password Security.
 Better Online Shopping and Payments
  System.
   For the Merchant It can be too expensive
    because in Purchasing Software, Monthly
    Fee, Setup Fee, Per Transactions Fee so
    customer has to also face these Expenses.

    There may be more phishing attacks with
    unfamiliar domains because of Vendor’s MCS
    and Out Sourced ACS Implementations by
    issuing banks.
 It was officially launched in 2007 and now
  most of the banks are working with this.
 ICICI and more Banks are working on
  implementing on 3-D Secure.
 As Now more than 100 vendors are
  developing 3-D Secure.
 Current Version 1.0.2 is running with high
  Performance.
   Please ask Queries
   Thank you

Weitere ähnliche Inhalte

Was ist angesagt? (20)

3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D password
3D password3D password
3D password
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3 d password
3 d password3 d password
3 d password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D password
3D password 3D password
3D password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3 d password
3 d password 3 d password
3 d password
 
3D password
3D password3D password
3D password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password3 d password
3 d password
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 

Andere mochten auch

3D secure password
3D secure password3D secure password
3D secure passwordachintya354
 
A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...Marios Pitikakis
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure ProtocolVlad Petre
 
INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTAnil Mahapatra
 
Seminar Mobile Iptv
Seminar Mobile IptvSeminar Mobile Iptv
Seminar Mobile Iptvagni.anand
 

Andere mochten auch (10)

3D secure password
3D secure password3D secure password
3D secure password
 
A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
 
3D printing
3D printing 3D printing
3D printing
 
Iptv
IptvIptv
Iptv
 
3D-Doctor
3D-Doctor3D-Doctor
3D-Doctor
 
INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPT
 
Mobile IPTV
Mobile IPTVMobile IPTV
Mobile IPTV
 
3D Searching by ruchi
3D Searching by ruchi3D Searching by ruchi
3D Searching by ruchi
 
Seminar Mobile Iptv
Seminar Mobile IptvSeminar Mobile Iptv
Seminar Mobile Iptv
 

Ähnlich wie 3D PASSWORD

3 d secure password
3 d secure password3 d secure password
3 d secure passwordachintya354
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptxRushikeshChikane2
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsIJERD Editor
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordIOSR Journals
 
Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Amila Gamanayake
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7koolkampus
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...Dr. Amarjeet Singh
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsBayalagmaa Davaanyam
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationeSAT Journals
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationseSAT Publishing House
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD Editor
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxgilpinleeanna
 

Ähnlich wie 3D PASSWORD (20)

3 d secure pin (1)
3 d secure pin (1)3 d secure pin (1)
3 d secure pin (1)
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
120 i143
120 i143120 i143
120 i143
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
E-Business security
E-Business security E-Business security
E-Business security
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
E banking security
E banking securityE banking security
E banking security
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
Group1
Group1Group1
Group1
 

Kürzlich hochgeladen

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...Poonam Aher Patil
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701bronxfugly43
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfPoh-Sun Goh
 

Kürzlich hochgeladen (20)

Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701ComPTIA Overview | Comptia Security+ Book SY0-701
ComPTIA Overview | Comptia Security+ Book SY0-701
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 

3D PASSWORD

  • 2. 3-D Secure Password
  • 3.  It is an E-Commerce Application for payment System.  To know about the 3-D Secure password we need to know about 3-D and then 3-D Secure.  3-D Stands for Three Domains here.  3-D Secure is XML Based Protocol to implement the better security to the Credit and Debit card Transactions.  So The Password formed by 3-D Secure Protocol is called 3-D Secure Password.
  • 4.  Three Domains Consist of Three Type of Domains.  The Very First is Acquirer Domain. (The Merchant and The Bank to which money is being paid).  The Second is Issuer Domain.(The Bank which issued the card being used)  And Last but certainly not the least is Interoperability Domain.(The Infrastructure provided by the credit card scheme to support the 3-D Secure Protocol)
  • 5.  It was very firstly developed by the company “VISA” and gave the name “Verified by Visa” (VBV) .  Now it is also adopted by the company “Master Card” and gave the name “Master Card Secure Code” (MCSC).  It is also being used by the company “JCB International” and gave name “J/Secure”
  • 6.  CUSTOMER  MERCHANT  BANK  INFRASTRUCTURE  SERVICE OR PRODUCT
  • 7.  Basically 3-D Secure Password is used to provide the better security to the Customers for Transactions in the Online Payment System.  For Online Purchasing mostly we have to pay Digital Cash so we have to deal online then it includes Bank, Merchant and Customer . So there is requirement of security from Fraud and Money Theft.  It is being used for removing the Risk over the Internet so that customer can feel free in doing Online Transactions.
  • 8. This protocol uses XML messages sent over SSL connections with client authentication (this ensures the authenticity of both peers, the server and the client, using digital certificates).  This is a one time process which takes place on the card issuer's website and involves the cardholder answering several security questions to which only the card issuer and cardholder will know the answer. The cardholder selects a password and agrees on a secret phrase, which will be used by the card issuer during each online transaction.  3D Secure can be thought of as an online version of “Chip and Pin technology”.
  • 9.  In order for a Visa or MasterCard member bank to use the service, the bank has to operate compliant software that supports the latest protocol specifications. Once compliant software is installed, the member bank will perform product integration testing with the payment system server before it rolls out the system.  3-D Secure Components ACS Providers MPI Providers (Access Control Server) (Merchant Plug-In)
  • 10. In 3-D Secure protocol, ACS (Access Control Server) is on the issuer side (banks). Currently, most banks outsource ACS to a third party. Commonly, the buyer's web browser shows the domain name of the ACS provider, rather than banks' domain name, however this is not required by the protocol. Dependent on the ACS provider, it is possible to specify a bank owned domain name for use by the ACS.
  • 11. Each 3-D secure transaction involves two simple internet request/response pairs: VEReq/VERes and PAReq/PARes. Visa and MasterCard don't license merchants for sending requests to their servers. They isolate their servers by licensing software providers which are called MPI (Merchant Plug-In) providers.
  • 12. Transactions flow Achieve Security Using 3-D secure password Implementation of 3-D secure password Time spent
  • 13. REGISTER YOURSELF WITH THE 1 BANK BEFORE SHOPPING. DON’T ENTER A PASSWORD TO 2 THE POP Ups. BANK MUST PROVIDE THE 3 CUSTOMER THE INLINE FRAME(IFRAME).
  • 14. This implementation curve may be like this……
  • 15. Reduction in “Unauthorized Transactions” CHARGE BACK.  More Security and Reliability.  More Security means more of the Customers more if Transactions which is beneficial.  Authentication
  • 16.  Decreased Risk of Fraud for Online Payment.  Better Password Security.  Better Online Shopping and Payments System.
  • 17. For the Merchant It can be too expensive because in Purchasing Software, Monthly Fee, Setup Fee, Per Transactions Fee so customer has to also face these Expenses.  There may be more phishing attacks with unfamiliar domains because of Vendor’s MCS and Out Sourced ACS Implementations by issuing banks.
  • 18.  It was officially launched in 2007 and now most of the banks are working with this.  ICICI and more Banks are working on implementing on 3-D Secure.  As Now more than 100 vendors are developing 3-D Secure.  Current Version 1.0.2 is running with high Performance.
  • 19. Please ask Queries
  • 20. Thank you