25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The certificate authority SET processing uses public key cryptography, so each<br />

element of the system need one or more public key<br />

certificates. Several layers of CA are described in the<br />

specification. (We discuss SET certificates in 22.15.3,<br />

“The SET certificate scheme” on page 883.)<br />

22.15.2 SET transactions<br />

The SET specification describes a number of transaction flows for purchasing,<br />

authentication, payment reversal, <strong>and</strong> so on. Figure 22-56 shows the<br />

transactions involved in a typical online purchase.<br />

Cardholder Merchant<br />

1<br />

2<br />

3<br />

4<br />

5<br />

PInitReq<br />

PInitRes<br />

PReq<br />

PRes<br />

InqReq<br />

InqRes<br />

Figure 22-56 Typical SET transaction sequence<br />

AuthReq<br />

AuthRes<br />

CapReq<br />

CapRes<br />

Acquirer<br />

Gateway<br />

MasterCard<br />

International<br />

MasterCard<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 881

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!