What Is Credit Card Payment Protection?
Credit card payment methods are mainly credit card payments without security measures, payment through third-party brokers, simple credit card payment, etc.
Credit card payment method
- Chinese name
- Credit card payment method
- the main form
- pos machine
- Be applicable
- B2C, C2C website
- Types of
- the way
- Credit card payment methods are mainly credit card payments without security measures, payment through third-party brokers, simple credit card payment, etc.
- Mainly credit card payment without security measures, payment through third-party brokers, simple credit card encryption payment, etc.
- Credit card payment without security measures: The basic process of credit card payment without security measures is: consumers order from merchants, and credit card information is transmitted via non-Internet, such as telephone and fax, but without security measures, merchants and banks use their existing Authorization to check the legitimacy of the credit card.
- Payment through a third-party broker: Payment is made through a third party that both parties trust; credit card information is not transmitted multiple times on the open network, and the buyer may open an account with a third party offline, so the buyer does not risk theft of credit card information;
- Simple credit card encrypted payment: When using the simple encrypted credit card mode to pay, when the buyer enters the browser window or other e-commerce device, the credit card information is simply encrypted, and it is securely transmitted from the buyer to the seller through the network as encrypted information.
- Step 1: The buyer selects the desired product on the online store (click "add to cart" to add the selected product to the shopping cart)
- Step 2: View the details of the products purchased in the shopping cart (click "check out" to pay for the products purchased)
- Step 3: Select the delivery type (After selecting the delivery type, click "continue" and select the payment method)
- Step 4: Select payment mode (select our credit card payment-95epay payment)
- Step 5: Order confirmation (final confirmation, then click "confirm order" to enter the payment gateway page for credit card payment)
- Step 6: Enter the 95epay credit card payment page. On this page, the buyer fills in his credit card information (after completing the relevant credit card information, click "payment", the system will credit the
- Card information, order amount, order number, automatically encrypted and sent to the bank for verification)
- Step 7: Return the payment result (the order number formed by the website and the payment result seen by the buyer)
- Step 8: The merchant can see the payment status of this order in the background of the merchant paying by 95epay. If the payment is successful, the merchant can ship the goods to the buyer.
- Credit card payment security
- High security of a reliable system.
- The Shuanggan payment platform uses the famous mycoffee firewall to ensure that the Shuanggan payment gateway is protected from viruses and hackers, to avoid the threat of new vulnerabilities generated by the network, and to provide protection measures for the confidential data of merchant transactions, ensuring the platform's security and stability. The active defense system will defend unknown attacks and vulnerabilities based on strict security policies, filter and block attack events on legally open ports, and evaluate suspicious access to the internal network. Analyze and filter all network traffic, and record all suspicious access and various attack events. The core platform uses the industry's most advanced system architecture to ensure that all network and application layer services are LoadBalanced. Guarantee merchants and cardholders 7 × 24 hours safe, stable and efficient experience of all products of dual payment. Using SSL128-bit digital transmission encryption standard.
- The Shuanggan payment platform uses the SSL certificate (128-bit) provided by the world-renowned certification center VeriSign. The client's browser uses the https protocol when sending CGI requests, and all https requests sent by the client and the results returned by the Web server will automatically use SSL encryption. The data sent by the customer to the service provider through the network will be automatically encrypted. After the other end receives the data, the encoded data will be restored. Even if the thief obtains the encoded information on the Internet, he cannot obtain readable and useful information without the originally programmed cryptographic algorithm. Therefore, the dual payment can ensure the confidentiality of payment information, the integrity of the payment process, the legal identity and operability of merchants and customers, and other relevant information. Md5 authentication of the order payment interface.
- In order to ensure that the orders sent by merchants to Shuangqian Payment cannot be maliciously tampered with, Shuangqian Payment provides Md5-based digest authentication for merchant order payment interfaces. Merchants can use the order number + order amount + order date + login administrator password in the merchant's backend as clear text to perform md5 digest, and send the generated digest together with the order payment information to Shuanggan Payment. Shuanggan Payment uses Md5 digest authentication to determine the order Whether the information has been tampered with, thereby protecting the interests of the merchants. Digital signature verification returned by the transaction .
- The purpose of digital signature authentication is to ensure the integrity and authenticity of the information during the transmission of the information and to provide confirmation of the identity of the sender of the information. The digital signature enables the receiver to verify the signature of the message by the sender, the sender cannot deny the signature of the message afterwards, and the receiver cannot forge the signature of the message. If the merchant has high requirements on the authenticity of the data returned by the dual payment system, the public key and components we issue to the merchant can be used to verify the signature to prevent others from simulating the return of the dual payment system to ensure the safe operation of the system. In this way, the interests of merchants and customers are protected to the greatest extent.