25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

5. Capture<br />

Up to this point, no money has changed h<strong>and</strong>s. The capture request from the<br />

merchant tells the acquirer to transfer the previously authorized amount to its<br />

account.<br />

In fact, capture can be incorporated as part of the authorization<br />

request/response (see the previous information). However, there are<br />

situations in which the merchant might want to capture the funds later. For<br />

example, most mail order operations do not debit the credit card account until<br />

the goods have been shipped.<br />

There are several other transactions within the SET specification, but the<br />

previous summary shows the principles on which it is based.<br />

22.15.3 The SET certificate scheme<br />

The SET specification envisions hundreds of thous<strong>and</strong>s of participants<br />

worldwide. Potentially, each of these would have at least one public key<br />

certificate. In fact, the protocol calls for an entity to have multiple certificates in<br />

some cases. For example, the acquirer payment gateways need one for signing<br />

messages <strong>and</strong> another for encryption purposes.<br />

Chapter 22. <strong>TCP</strong>/<strong>IP</strong> security 883

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!