25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The diagram shows the following transactions (each transaction consists of a<br />

request/response pair):<br />

1. PInit<br />

This initializes the system, including details such as the br<strong>and</strong> of card being<br />

used <strong>and</strong> the certificates held by the cardholder. SET does not insist that<br />

cardholders have signing certificates, but it does recommend them. A<br />

cardholder certificate binds the credit card account number to the owner of a<br />

public key. If the acquirer receives a request for a given card number signed<br />

with the cardholder's public key, it knows that the request came from the real<br />

cardholder. To be precise, it knows that the request came from a computer<br />

where the cardholder's keyring was installed <strong>and</strong> available. It could still be a<br />

thief who had stolen the computer <strong>and</strong> cracked the keyring password.<br />

2. Purchase order<br />

This is the request from the cardholder to buy something. The request<br />

message is in fact two messages combined, the order instruction (OI), which<br />

is sent in the clear to the merchant, <strong>and</strong> the purchase instruction (PI), which<br />

the merchant passes on to the acquirer payment gateway. The PI is<br />

encrypted in the public key of the acquirer, so the merchant cannot read it.<br />

The merchant stores the message for later transmission to the acquirer. The<br />

PI also includes a hash of the OI, so the two messages can only be h<strong>and</strong>led<br />

as a pair. Note that the card number is only placed in the PI portion of the<br />

request. This means that the merchant never has access to it, thereby<br />

preventing a fraudulent user from setting up a false store front to collect credit<br />

card information.<br />

The purchase order has a response, which is usually sent (as shown here)<br />

after acquirer approval has been granted. However, the merchant can<br />

complete the transaction with the cardholder before authorization, in which<br />

case the cardholder would see a message that the request was accepted<br />

pending authorization.<br />

3. Authorization<br />

In this request, the merchant asks the acquirer, through the acquirer payment<br />

gateway, to authorize the request. The message includes a description of the<br />

purchase <strong>and</strong> the cost. It also includes the PI from the purchase order that the<br />

cardholder sent. In this way, the acquirer knows that the merchant <strong>and</strong> the<br />

cardholder both agree on what is being purchased <strong>and</strong> the amount.<br />

When the acquirer receives the request, it uses the existing bank card<br />

network to authorize the request <strong>and</strong> sends back an appropriate response.<br />

4. Inquiry<br />

The cardholder might want to know how his or her request is proceeding. The<br />

SET specification provides an inquiry transaction for that purpose.<br />

882 <strong>TCP</strong>/<strong>IP</strong> <strong>Tutorial</strong> <strong>and</strong> <strong>Technical</strong> <strong>Overview</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!