SEOMining SEOMining


Ecommerce Implementation  «Prev  Next»
Lesson 11 SET protocol
ObjectiveDescribe the SET protocol.

SET protocol (Description)

Created by Visa and MasterCard specifically for the use in financial transactions, the SET protocol requires that all participants have certificates for identification. In the SET protocol, the merchant never sees the credit card number because the information is encrypted for the merchant's bank only.
In a SET, the software components required by the various participants are:
  1. Card holder wallet application
  2. Merchant SET point-of-sale software
  3. Payment gateway software
  4. CA software
SET supports activities such as credits, returning of goods, reverse authorizations, and chargebacks.

Trust chaining

SET uses the concept of trust chaining. All the parties trust each other and can exchange information with each other. What is more, each party in the transaction processes only that information that directly concerns it. For example, the merchant never learns the credit card number of the client. The merchant simply trusts the merchant bank to inform it that the bank authorized the transaction.
One of the important differences between a SET and other e-commerce transactions that occur in the United States is that SET provides for the use of an acquirer to verify the card holder's credit card instantly.
The FlipBook below is an abbreviated presentation of a SET.
Set Transaction 1
1) Set Transaction 1
Set Transaction 2
2) Set Transaction 2
Set Transaction 3
3) Set Transaction 3
Set Transaction 4
4) Set Transaction 4
Set Transaction 5
5) Set Transaction 5
Set Transaction 6
6) Set Transaction 6
Set Transaction 7
7) Set Transaction 7
Set Transaction 8
8) Set Transaction 8

Cardholder Merchant Transaction

Order Steps Set - Exercise

Click the Exercise link below to review the steps required in a SET.
Order Steps Set - Exercise

Set Protocol - Exercise

Click the Exercise link below to complete the course project for this module. You will create and certify a certificate to enable SSL encryption.
Set Protocol - Exercise
The next lesson concludes this module.
Trust chaining: The ability for businesses to work together and process only that information they need. Each business along the chain must trust the other implicitly for the entire process to work.