ABSTRACT
Secure electronic payment system is presented in this paper. This electronic payment system is to be secure for clients such as customers and shop owners. The security architecture of the system is designed by RC5 encryption / decryption algorithm. This eliminates the fraud that occurs today with stolen credit card numbers. The symmetric key cryptosystem RC5 can protect conventional transaction data such as account numbers, amount and other information. This process can be done electronically using RC5 encryption / decryption program written by Microsoft Visual Basic 6.0. There is no danger of any data sent within the system being intercepted, and replaced. The alternative is to use the existing network, and to encrypt all data transmissions. The system with
encryption is acceptably secure, but that the level of encryption has to be stepped up, as computing power increases. Results In order to be secure the system the communication between modules is encrypted using symmetric key cryptosystem RC5. The system will use simple user name, password, user ID, user type and cipher authentication mechanism for identification, when the user first enters the system. It is the most common method of authentication in most computer system.
TABLE OF CONTENTS
TITLE PAGE
CERTIFICATION PAGE
DEDICATION
ACKNOWLEDGEMENT
ABSTRACT
CHAPTER ONE
1.0INTRODUCTION
1.1STATEMENT OF PROBLEM
1.2PURPOSE OF STUDY
1.3IMPORTANCE OF THE STUDY
1.4DEFINITION OF TERMS
DBMS - DATABASE MANAGEMENT SYSTEM
PSP - PAYMENT SERVICE PROVIDERS
1.5ASSUMPTION OF THE STUDY
CHAPTER TWO
2.0LITERATURE REVIEW
2.1CREDIT CARDS AND SMART CARDS
2.2ELECTRONIC BILL PRESENTMENT AND PAYMENT
CHAPTER THREE
3.0A LAYERED PROTOCOL MODEL.
3.2PAYMENT PROTOCOL MODELS INCLUDES THE FOLLOWING;
3.3LIST OF INTERNET PAYMENTS SCHEMES AND PROPOSALS
BANKNET ELECTRONIC BANKING SERVICE MARKET-NET
BARCLAYNET BARCLAYCARD
CAFE CAFE
E-CASH DIGICASH ANONYMOUS DIGITAL CASH
GREEN COMMERCE FIRST VIRTUAL
FBOI FIRST BANK OF INTERNET
LETSYSTEMS
CHAPTER FOUR
ï± MANUAL E-PAYMENT
4.1IMPLEMENTATION ROAD MAP
CHAPTER FIVE
5.0CONCLUSION
5.1 LIMITATION OF THE STUDY
5.2SUGGESTION FOR FURTHER STUDY
REFERENCES
Disclaimer: Note this academic material is intended as a guide for your academic research work. Do not copy word for word. Note: For Computer or Programming related works, some works might not contain source codes
CITE THIS WORK
(2012, 11). Electronic Payment System Security.. ProjectStoc.com. Retrieved 11, 2012, from https://projectstoc.com/read/289/electronic-payment-system-security
"Electronic Payment System Security." ProjectStoc.com. 11 2012. 2012. 11 2012 <https://projectstoc.com/read/289/electronic-payment-system-security>.
"Electronic Payment System Security.." ProjectStoc.com. ProjectStoc.com, 11 2012. Web. 11 2012. <https://projectstoc.com/read/289/electronic-payment-system-security>.
"Electronic Payment System Security.." ProjectStoc.com. 11, 2012. Accessed 11, 2012. https://projectstoc.com/read/289/electronic-payment-system-security.
- Related Works
- Design And Implementation Of A Computerized Price Determining System For Shop Wares (case Study Of Roban Stores Enugu)
- Design And Implementation Of A Computerized Budgeting System (a Case Study Of I.m.t., Enugu)
- Design And Implementation Of Html Editor (case Study Of Microsoft Corporation)
- Design And Implementation Of A Software For The Computation Of Students Cgpa (a Case Study Of Computer Study Of Computer Science Department Imt Enugu)
- Inventory Management System
- Design And Implementation Of A Computerized Pharmacy Management System ( Case Study Of Juhel Pharmaceuticals Ltd, Enugu)
- Design And Implementation Of Computerized Medical Duties Scheduling System. (a Case Study Of University Of Nigeria Teaching Hospital)
- Java Network File Sharing System
- Telecom Inventory Maintenance Services Application With Error Tracking
- Design And Implementation Of A Bill Of Materials Processing System (a Case Study Of Emenite Nig. Ltd. Emene, Enugu)