home *** CD-ROM | disk | FTP | other *** search
/ Developer Source 10 / developer source - volume 10.iso / oracl / jul96 / 1p46.gif < prev    next >
Graphics Interchange Format  |  1998-02-10  |  52KB  |  231x864  |  4-bit (16 colors)
Labels: text | screenshot | menu
OCR: Step by Step: Securing private transactions over public networks CUSSOMET Customer uses Web-browser software ORDER FORM to run order through Kay 18, 1996 a hash algorithm 1959 metropolitan Itubeap $179. for inessage-digest Charge .Wiem 4014 972-393.937 algorithm, such as Sxpiron :1/97 MD5}, to creote a fixed-length digest of the order. HASH ALGORITHM 83769366767834 message digest Customer's private key encrypts message Customer's private key digest to create (383763674936flooid ... ] a digital signature. BOB digital signature 3 Customer's software appends digital ORDER FORM Nay 10. 1396 signature to original order. 1959 Metropolitan Hubcap. Charge Vina 4014:973 393 933 Expires 1/7T BOB 4 Customer's software encrypts order and then encrypts Merchant's certified public key entire package (17373047sc2d83 ... ) with merchant's Certificate authority = Verisign certified public key and sends it lo ineichont, TO: MERCHANT 5 merchant Merchont uses private key to decrypt order. ORDER FORM Hay 12, 1995 Merchant's application Order 11). validates the signature" 1959 HotEccolitan mibesp. $179 .. 10 prove that the Charge Vinn 4014 273 393 933 message has not been Expirer 1/97 dumpered with: BOR 6 Merchant forwards credit card transaction information to the credit cord payment system, using its bank as an entry point. Visa, Master Card