SlideShare una empresa de Scribd logo
1 de 20
Seminar on
3-D secure password
3-D Secure
  Password
  It is an E-Commerce Application for
  payment System.
 To know about the 3-D Secure password we
  need to know about 3-D and then 3-D Secure.
 3-D Stands for Three Domains here.
 3-D Secure is XML Based Protocol to
  implement the better security to the Credit
  and Debit card Transactions.
 So The Password formed by 3-D Secure
  Protocol is called 3-D Secure Password.
 Three Domains Consist of Three Type of
  Domains.
 The Very First is Acquirer Domain. (The
  Merchant and The Bank to which money is
  being paid).
 The Second is Issuer Domain.(The Bank
  which issued the card being used)
 And Last but certainly not the least is
  Interoperability Domain.(The Infrastructure
  provided by the credit card scheme to
  support the 3-D Secure Protocol)
 It was very firstly developed by the company
  “VISA” and gave the name “Verified by Visa”
  (VBV) .
 Now it is also adopted by the company
  “Master Card” and gave the name “Master
  Card Secure Code” (MCSC).
 It is also being used by the company “JCB
  International” and gave name “J/Secure”
 CUSTOMER
 MERCHANT
 BANK
 INFRASTRUCTURE
 SERVICE OR PRODUCT
 Basically 3-D Secure Password is used to
  provide the better security to the Customers
  for Transactions in the Online Payment
  System.
 For Online Purchasing mostly we have to pay
  Digital Cash so we have to deal online then it
  includes Bank, Merchant and Customer .
  So there is requirement of security from
  Fraud and Money Theft.
 It is being used for removing the Risk over
  the Internet so that customer can feel free in
  doing Online Transactions.
   This protocol uses XML messages sent over SSL
    connections with client authentication (this
    ensures the authenticity of both peers, the
    server and the client, using digital certificates).
   This is a one time process which takes place on
    the card issuer's website and involves the
    cardholder answering several security questions
    to which only the card issuer and cardholder will
    know the answer. The cardholder selects a
    password and agrees on a secret phrase, which
    will be used by the card issuer during each
    online transaction.
   3D Secure can be thought of as an online version
    of “Chip and Pin technology”.
 In order for a Visa or MasterCard member
  bank to use the service, the bank has to
  operate compliant software that supports the
  latest protocol specifications. Once
  compliant software is installed, the member
  bank will perform product integration testing
  with the payment system server before it
  rolls out the system.
 3-D Secure Components
     ACS Providers               MPI Providers
  (Access Control Server)     (Merchant Plug-In)
   In 3-D Secure protocol, ACS (Access Control
    Server) is on the issuer side (banks).
    Currently, most banks outsource ACS to a
    third party. Commonly, the buyer's web
    browser shows the domain name of the ACS
    provider, rather than banks' domain name,
    however this is not required by the protocol.
    Dependent on the ACS provider, it is possible
    to specify a bank owned domain name for
    use by the ACS.
   Each 3-D secure transaction involves two
    simple internet request/response pairs:
    VEReq/VERes and PAReq/PARes. Visa and
    MasterCard don't license merchants for
    sending requests to their servers. They
    isolate their servers by licensing software
    providers which are called MPI (Merchant
    Plug-In) providers.
Transactions flow




                                                   Achieve
                                                   Security


                                       Using 3-D
                                        secure
                                       password

                    Implementation
                     of 3-D secure
                       password


                                 Time spent
REGISTER YOURSELF WITH THE
1   BANK BEFORE SHOPPING.


    DON’T ENTER A PASSWORD TO
2   THE POP Ups.

    BANK MUST PROVIDE THE
3   CUSTOMER THE INLINE
    FRAME(IFRAME).
This implementation curve may be like this……
   Reduction in “Unauthorized Transactions”
    CHARGE BACK.

   More Security and Reliability.

   More Security means more of the Customers
    more if Transactions which is beneficial.

   Authentication
 Decreased Risk of Fraud for Online Payment.
 Better Password Security.
 Better Online Shopping and Payments
  System.
   For the Merchant It can be too expensive
    because in Purchasing Software, Monthly
    Fee, Setup Fee, Per Transactions Fee so
    customer has to also face these Expenses.

    There may be more phishing attacks with
    unfamiliar domains because of Vendor’s MCS
    and Out Sourced ACS Implementations by
    issuing banks.
 It was officially launched in 2007 and now
  most of the banks are working with this.
 ICICI and more Banks are working on
  implementing on 3-D Secure.
 As Now more than 100 vendors are
  developing 3-D Secure.
 Current Version 1.0.2 is running with high
  Performance.
   Please ask Queries
   Thank you

Más contenido relacionado

La actualidad más candente

3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
Swagato Dey
 

La actualidad más candente (20)

3d password 23 mar 14
3d password 23 mar 143d password 23 mar 14
3d password 23 mar 14
 
3D password
3D password3D password
3D password
 
3D PASSWORD
3D PASSWORD 3D PASSWORD
3D PASSWORD
 
3D PASSWORD SEMINAR
3D PASSWORD SEMINAR3D PASSWORD SEMINAR
3D PASSWORD SEMINAR
 
3D-Password
3D-Password 3D-Password
3D-Password
 
3 d password
3 d password3 d password
3 d password
 
3d password ppt
3d password ppt3d password ppt
3d password ppt
 
3D Password and its importance
3D Password and its importance3D Password and its importance
3D Password and its importance
 
3D password
3D password 3D password
3D password
 
3D PASSWORD
3D PASSWORD3D PASSWORD
3D PASSWORD
 
3D Password
3D Password3D Password
3D Password
 
3D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 13D Password M Sc BHU Sem 1
3D Password M Sc BHU Sem 1
 
3 d password
3 d password 3 d password
3 d password
 
3D password
3D password3D password
3D password
 
3d password - Report
3d password - Report  3d password - Report
3d password - Report
 
3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad3D Password by Kuldeep Dhakad
3D Password by Kuldeep Dhakad
 
3D Password
3D Password3D Password
3D Password
 
3 d password
3 d password3 d password
3 d password
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
Ppt on 3d password (2)
Ppt on 3d password (2)Ppt on 3d password (2)
Ppt on 3d password (2)
 

Destacado

INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPT
Anil Mahapatra
 
Seminar Mobile Iptv
Seminar Mobile IptvSeminar Mobile Iptv
Seminar Mobile Iptv
agni.anand
 

Destacado (10)

3D secure password
3D secure password3D secure password
3D secure password
 
A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...A semantic-based framework for managing, searching and retrieving 3D resource...
A semantic-based framework for managing, searching and retrieving 3D resource...
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
 
3D printing
3D printing 3D printing
3D printing
 
Iptv
IptvIptv
Iptv
 
3D-Doctor
3D-Doctor3D-Doctor
3D-Doctor
 
INTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPTINTERNET PROTOCOL TELEVISION SEMINAR PPT
INTERNET PROTOCOL TELEVISION SEMINAR PPT
 
Mobile IPTV
Mobile IPTVMobile IPTV
Mobile IPTV
 
3D Searching by ruchi
3D Searching by ruchi3D Searching by ruchi
3D Searching by ruchi
 
Seminar Mobile Iptv
Seminar Mobile IptvSeminar Mobile Iptv
Seminar Mobile Iptv
 

Similar a 3D PASSWORD

SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
International Journal of Technical Research & Application
 
Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)
Amila Gamanayake
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
koolkampus
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD Editor
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
gilpinleeanna
 

Similar a 3D PASSWORD (20)

3 d secure pin (1)
3 d secure pin (1)3 d secure pin (1)
3 d secure pin (1)
 
3 d secure password
3 d secure password3 d secure password
3 d secure password
 
87559489 auth
87559489 auth87559489 auth
87559489 auth
 
Chapter 2 System Security.pptx
Chapter 2 System Security.pptxChapter 2 System Security.pptx
Chapter 2 System Security.pptx
 
120 i143
120 i143120 i143
120 i143
 
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM TransactionsAnalysis of Security Algorithms used in E-Commerce and ATM Transactions
Analysis of Security Algorithms used in E-Commerce and ATM Transactions
 
Two Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time PasswordTwo Factor Authentication Using Smartphone Generated One Time Password
Two Factor Authentication Using Smartphone Generated One Time Password
 
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORDSECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
SECURED BANKING TRANSACTION USING VIRTUAL PASSWORD
 
Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
E-Business security
E-Business security E-Business security
E-Business security
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...A Review of Information Security from Consumer’s Perspective Especially in On...
A Review of Information Security from Consumer’s Perspective Especially in On...
 
E banking security
E banking securityE banking security
E banking security
 
Online applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cardsOnline applications using strong authentication with OTP grid cards
Online applications using strong authentication with OTP grid cards
 
A secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authenticationA secure communication in smart phones using two factor authentication
A secure communication in smart phones using two factor authentication
 
A secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authenticationsA secure communication in smart phones using two factor authentications
A secure communication in smart phones using two factor authentications
 
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
IJERD (www.ijerd.com) International Journal of Engineering Research and Devel...
 
Multifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docxMultifactor authenticationMultifactor authentication or MFA .docx
Multifactor authenticationMultifactor authentication or MFA .docx
 
Group1
Group1Group1
Group1
 

Último

Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Último (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 

3D PASSWORD

  • 2. 3-D Secure Password
  • 3.  It is an E-Commerce Application for payment System.  To know about the 3-D Secure password we need to know about 3-D and then 3-D Secure.  3-D Stands for Three Domains here.  3-D Secure is XML Based Protocol to implement the better security to the Credit and Debit card Transactions.  So The Password formed by 3-D Secure Protocol is called 3-D Secure Password.
  • 4.  Three Domains Consist of Three Type of Domains.  The Very First is Acquirer Domain. (The Merchant and The Bank to which money is being paid).  The Second is Issuer Domain.(The Bank which issued the card being used)  And Last but certainly not the least is Interoperability Domain.(The Infrastructure provided by the credit card scheme to support the 3-D Secure Protocol)
  • 5.  It was very firstly developed by the company “VISA” and gave the name “Verified by Visa” (VBV) .  Now it is also adopted by the company “Master Card” and gave the name “Master Card Secure Code” (MCSC).  It is also being used by the company “JCB International” and gave name “J/Secure”
  • 6.  CUSTOMER  MERCHANT  BANK  INFRASTRUCTURE  SERVICE OR PRODUCT
  • 7.  Basically 3-D Secure Password is used to provide the better security to the Customers for Transactions in the Online Payment System.  For Online Purchasing mostly we have to pay Digital Cash so we have to deal online then it includes Bank, Merchant and Customer . So there is requirement of security from Fraud and Money Theft.  It is being used for removing the Risk over the Internet so that customer can feel free in doing Online Transactions.
  • 8. This protocol uses XML messages sent over SSL connections with client authentication (this ensures the authenticity of both peers, the server and the client, using digital certificates).  This is a one time process which takes place on the card issuer's website and involves the cardholder answering several security questions to which only the card issuer and cardholder will know the answer. The cardholder selects a password and agrees on a secret phrase, which will be used by the card issuer during each online transaction.  3D Secure can be thought of as an online version of “Chip and Pin technology”.
  • 9.  In order for a Visa or MasterCard member bank to use the service, the bank has to operate compliant software that supports the latest protocol specifications. Once compliant software is installed, the member bank will perform product integration testing with the payment system server before it rolls out the system.  3-D Secure Components ACS Providers MPI Providers (Access Control Server) (Merchant Plug-In)
  • 10. In 3-D Secure protocol, ACS (Access Control Server) is on the issuer side (banks). Currently, most banks outsource ACS to a third party. Commonly, the buyer's web browser shows the domain name of the ACS provider, rather than banks' domain name, however this is not required by the protocol. Dependent on the ACS provider, it is possible to specify a bank owned domain name for use by the ACS.
  • 11. Each 3-D secure transaction involves two simple internet request/response pairs: VEReq/VERes and PAReq/PARes. Visa and MasterCard don't license merchants for sending requests to their servers. They isolate their servers by licensing software providers which are called MPI (Merchant Plug-In) providers.
  • 12. Transactions flow Achieve Security Using 3-D secure password Implementation of 3-D secure password Time spent
  • 13. REGISTER YOURSELF WITH THE 1 BANK BEFORE SHOPPING. DON’T ENTER A PASSWORD TO 2 THE POP Ups. BANK MUST PROVIDE THE 3 CUSTOMER THE INLINE FRAME(IFRAME).
  • 14. This implementation curve may be like this……
  • 15. Reduction in “Unauthorized Transactions” CHARGE BACK.  More Security and Reliability.  More Security means more of the Customers more if Transactions which is beneficial.  Authentication
  • 16.  Decreased Risk of Fraud for Online Payment.  Better Password Security.  Better Online Shopping and Payments System.
  • 17. For the Merchant It can be too expensive because in Purchasing Software, Monthly Fee, Setup Fee, Per Transactions Fee so customer has to also face these Expenses.  There may be more phishing attacks with unfamiliar domains because of Vendor’s MCS and Out Sourced ACS Implementations by issuing banks.
  • 18.  It was officially launched in 2007 and now most of the banks are working with this.  ICICI and more Banks are working on implementing on 3-D Secure.  As Now more than 100 vendors are developing 3-D Secure.  Current Version 1.0.2 is running with high Performance.
  • 19. Please ask Queries
  • 20. Thank you