File APIs for Java Developers
Manipulate DOC, XLS, PPT, PDF and many others from your application.
http://aspose.com/file-tools
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic

Encryption methodologies in payment system

 
Ramesh Srinivasan
Ranch Hand
Posts: 35
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Hello Ranchers,

I wanted to know security encryption methodologies of payment (internet) system.

If any one of you here had an experience about common encryption methodologies/authentication. please respond.

Your replies appreciated.

Thanks,
Ramesh.
 
Ulf Dittmer
Rancher
Pie
Posts: 42966
73
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
What kind of systems are you talking about, meaning what kinds of clients and servers? Is this about security within one system, or about communication between them?
 
Pat Farrell
Rancher
Posts: 4660
5
Linux Mac OS X VI Editor
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Originally posted by Ramesh Srinivasan:
If any one of you here had an experience about common encryption methodologies/authentication


You need to be more specific. A lot more specific, its a huge area.

I wrote security and encryption software for CyberCash, we invented Internet commerce. Seriously. The security was fine, the business went boom in the dot.bomb.

What do you mean by payment system? If you are actually writing a payment system, like CyberCash, or PayPal, then this is not the place to ask.

If you mean you want to setup a webstore and accept credit cards, that is a well understood problem. And you start by using HTTPS to protect data in transit.
 
Ramesh Srinivasan
Ranch Hand
Posts: 35
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Thanks for your response.
I am talking about card based security systems which means "EMV" Standards of securities. It basically performed in card such as Europay,Master,Visa.

On top java language what are the security methodologies/algorithms can be done respective card based authentication.

BTW, I am very new to this concept. Wanted to know some links,books on this.

Once again thanks for your prompt response.
 
greg stark
Ranch Hand
Posts: 220
  • 0
  • Mark post as helpful
  • send pies
  • Quote
  • Report post to moderator
Look at http://emvco.com/specifications.asp?show=107 and download Book 2.
  • Post Reply
  • Bookmark Topic Watch Topic
  • New Topic