Labels:text | screenshot | menu OCR: Step by Step: Securing private transactions over public networks CUSSOMET Customer uses Web-browser software ORDER FORM to run order through Kay 18, 1996 a hash algorithm 1959 metropolitan Itubeap $179. for inessage-digest Charge .Wiem 4014 972-393.937 algorithm, such as Sxpiron :1/97 MD5}, to creote a fixed-length digest of the order. HASH ALGORITHM 83769366767834 message digest Customer's private key encrypts message Customer's private key digest to create (383763674936flooid ... ] a digital signature. BOB digital signature 3 Customer's software appends digital ORDER FORM Nay 10. 1396 signature to original order. 1959 Metropolitan Hubcap. Charge Vina 4014:973 393 933 Expires 1/7T BOB 4 Customer's software encrypts order and then encrypts Merchant's certified public key entire package (17373047sc2d83 ... ) with merchant's Certificate authority = Verisign certified public key and sends it lo ineichont, TO: MERCHANT 5 merchant Merchont uses private key to decrypt order. ORDER FORM Hay 12, 1995 Merchant's application Order 11). validates the signature" 1959 HotEccolitan mibesp. $179 .. 10 prove that the Charge Vinn 4014 273 393 933 message has not been Expirer 1/97 dumpered with: BOR 6 Merchant forwards credit card transaction information to the credit cord payment system, using its bank as an entry point. Visa, Master Card