INDEX
Particulars Page No.
1.
Question 1 .............................................................................3-10
2. Question 2……………………………………………………11-12
3. Question 3…………………………………………………….13-14
4. Question 4…………………………………………………….15 -18
5. Question 6……………………………………………………19-20
6. Question 7 ……………………………………………………21-23
Q. 1.
Look up two cars manufactures website on the
internet. Configure the car of your choice and report your finding. Make sure
to include payment option, shipping charges, financing and delivery schedule.
Ans.- Here
we take Ford motor and Maruti Suzuki. So before starting we should understand
the company background.
Ford Motors –
When I visited the Ford motor
site than I saw this window for Configure the cars -
About Ford motors –
Ford started its
innings with the Mahindra-Ford joint venture formed in 1994, which produced the
Escort out of M&M Nashik plant.
After meeting initial success, sales of the Escort was finally replaced
by the Ikon in 1999.
The Ikon marked a new beginning for Ford in India. It rolled out of the Marajmalaingar plant
near Chennai and by now, the company had parted ways with M&M and was
renamed Ford India Ltd in 1998. The Ikon
was the first model by a multinational to be developed specifically for
India. Though it was based on the
Fiesta, it was a unique body style and was offered and was offered with an
option of three engines, including a diesel.
The car was a big hit. The Ikon underwent
several face-lifts and price cuts to keep demand high. However, fresher competition and a reputation
for high-maintenance saw sales gradually decline. After the arrival of the modern and
highly-capable Fiesta, another made-for-India car, with state-of-the-art
engines, the Ikon has been marginalized.
The Fiesta has picked up where the Ikon left and is selling well.
Though the Ikon and Fiesta have been
the mainstays of Ford’s production in India, the company has had limited
success with other models. The Mondeo,
launched in 2001, was a very talented car by was simply not suited to Indian
conditions and earned a reputation for being exorbitant to maintain.
The Endeavour SUV was launched in
early 2004 and has sold well for its niche.
The Endeavour has recently been upgraded in 2007 and this has boosted
the appeal of the big SUV. In 2004, Ford
launched the Fusion, which has received a lukewarm response though the recent
diesel variant has perked up sales.
Fusion:
PRICE(lacs)
|
6.59
|
|
|
Engine:
|
|
Type
|
4 Cyl. In – Line, 16 – V DOHC
|
Construction
|
All Aluminium Alloy
|
Fuel System
|
SEFI
|
Displacement (cc)
|
1596
|
Compression Ratio
|
9.75:1
|
Max. Power (ps/rpm)
|
101 / 6500
|
Max. Torque (nm/pm)
|
146 / 3400
|
Emission Stage
|
Bharat Stage III
|
Kerb Weight (Kg)
|
1143
|
Transmission
|
Manual 5 Speed
|
MaxSpeed (Kmph)
|
174
|
Mileage
|
11.3
|
|
|
Endeavour:
PRICE(lacs)
|
(4X2)
|
16.16
|
(4X4)
|
17.17
|
|
|
|
|
Engine:
|
|
|
Type
|
2.5 litre, 4 Cylinder in-line, Turbocharged &
inter-cooled diesel
|
|
Displacement (cc)
|
2499
|
|
Max. Power (PS/rpm)
|
116/3500
|
|
Max. Torque (kgm/rpm)
|
28.5/2000
|
|
Ignition System
|
Compression
|
|
Valve System
|
SOHC, 12 Valves
|
|
Fuel System
|
Indirect Injection Mechanical Pump
|
|
Emission
|
Exhaust Gas Recirculation (EGR) Meeting Bharat Stage III
Norms
|
|
Kerb Weight (Kg)
|
1933/1958
|
|
Transmission
|
Manual 5 Speed
|
|
MaxSpeed (Kmph)
|
142
|
|
Mileage
|
8.2
|
Fiesta:
Engine
|
1.4 EXI
|
1.6 ZXI
|
1.6 SXI
|
1.4EXI (TDCi)
|
1.4 ZXI (TDCi)
|
1.4 SXI (TDCi)
|
|
Price(in
lacs)
|
6.76
|
7.28
|
8.28
|
8.00
|
8.52
|
9.19
|
|
Type
|
4 Cylinder in-Line, 16
Valve DOHC
|
4 Cylinder in-Line, 8
Valve SOHC
|
|||||
Construction
|
All-aluminium Alloy
|
||||||
Fuel System
|
SEFI
|
High Pressure Common
Rail
|
|||||
Displacement
|
cc
|
1388
|
1596
|
1596
|
1399
|
1399
|
1399
|
Compression Ratio
|
9.75:1
|
9.75:1
|
9.75:1
|
18:1
|
18:1
|
18:1
|
|
Max. Power Output
|
ps/rpm
|
82/6000
|
101/6500
|
101/6500
|
68/4000
|
68/4000
|
68/4000
|
Max. Torque
|
Nm/rpm
|
127/4000
|
146/3400
|
146/3400
|
160/2000
|
160/2000
|
160/2000
|
Emmision Compliance
|
Bharat Stage III
|
||||||
Transmission Type
|
5 Speed Manual
|
||||||
Kerb Weight (Kg)
|
|
||||||
MaxSpeed (Kmph)
|
170/178
|
||||||
Mileage
|
14.75/13.6
|
Ikon:
PRICE(lacs)
|
5.50
|
|
|
Engine:
|
|
Type
|
4 Cylinder, 8-V SOHC, Rocam
Petrol
|
Fuel system
|
SEFI
|
Displacement (cc)
|
1299
|
Max. Power (ps/rpm)
|
70/5500
|
Max. Torque (Nm/rpm)
|
105/2500
|
Transmission Type
|
5 Speed Manual
|
Kerb Weight (Kg)
|
978
|
MaxSpeed (Kmph)
|
148
|
Mileage
|
10.8
|
MARUTHI:
It began with the promise of being
the ‘People’s Car’. The car never went
into production and the company went belly-up in 1977. Six years later, it rose like a phoenix from
the ashes and changed the Indian automotive sector forever. The company – Maruthi Udyog Limited. The story of Maruthi dates back to the
1970’s. Indira Gandhi was the prime
minister of India. Her son, Sanjay
Gandhi, envisioned the manufactured of an indigenous cost-effective,
low-maintenance compact car for the Indian middle-class. The Cabinet passed a
unanimous resolution for the development and production of a ‘People’s
Car’. The name of the car was chosen as
‘Maruti’.
The
Car that changed India:
The Maruthi 800 was essentially a Suzuki
SS80, which was called the Fronte
in Japan and Alto in most of the
other markets. The 796cc, in-line,
three-cylinder power plant produced 39.5bhp at 5500rpm.
Maruthi marked the beginning of a
revolution in the Indian automobile industry.
The Maruthi 800, with its compact size, nimble handling and perky
engine, offered the Indian motorist a cheaper, friendlier alternative. On 14th December 1983, Harpal
Singh became Maruthi’s first customer as he received the keys of his Maruthi
800 car from Prime Minister Indira Gandhi.
The car cost Rs.48,000. The new
Maruthi, launched in June 1986, cost approximately Rs 15,000 more than the
outgoing model.
The new Maruthi:
In 2005, Maruthi launched the Swift,
for the first time in its 20-year history.
The Swift signaled the importance of the Indian market in the
world. A team of engineers from Maruthi
worked on the design of the Swift in Hamamatsu, Suzuki’s headquarters in
Japan.
Product-
Model
Year of launching
Maruthi 800 1983
Maruthi Omni 1984
Maruthi Gypsy 1985
Maruthi 1000 1990
Maruthi Zen 1993
Maruthi Esteem 1994
Maruthi Baleno 1999
Maruthi Wagon R 1999
Maruthi Alto 2000
Maruthi Versa 2001
Maruthi Swift 2005
Maruthi Zen Estilo 2006
Maruthi SX4 2007
Maruthi Suzuki Grand Vitara 2007
Q. 2 Evaluate four high volume items that are sold on the internet . what
makes e-marketing so successful.
If you are an Internet entrepreneur, most likely one of your biggest goals is to find ways to create passive income streams for yourself so that you can work less, earn more and enjoy your life. Well, if you’re interested in creating passive income, then don’t give up on Amazon just yet. I want to show you why Amazon might be the best, and most dependable source of online passive income.
- Amazon has a huge selection
of high ticket items. Rather than devoting so much effort to get a high
volume of commissions on lower priced items, why not put that effort into
going after high-ticket items? Amazon.com sells well over 10,000 items
with a ticket price in excess of $10,000 or more.
- There is a lot less
pre-selling when you are marketing popular products that people are
already searching for information about online. When you are going after
buyer long tail keywords that contain the actual product name it’s easier
to attract targeted traffic for those keywords.
- You earn a commission
on the whole order that a buyer makes when they click on your link to
amazon.com.
- Amazon has is a strong,
trusted brand with a stellar reputation. People do not hesitate to buy
from Amazon, which makes the conversion process so much simpler.
Word Press blogs are quick and easy to set up and they make it so much simpler to gain good search engine rankings. The most important aspect of this whole operation is your content. You will be developing keyword rich content because the Amazon associates program works best with content rich blogs.
Finally, you’ll have to invest the time to build up traffic using on-site SEO techniques, building quality back links and using social bookmarking.
But once you have put in the time and effort to create your first niche affiliate blog, the next ones are so much easier as you will have overcome the initial learning curve. There are also lots of programs available that will walk you through step-by-step how to set up niche affiliate blogs, and some will even show you how to set up an automated blog network that cuts down on most of the manual work of setting up and maintaining a blog network.
So, the Amazon associates program just might be the best
source of passive online income, but you’ll never know unless you take some
action today and set up your blog
E bay ===
1.
o
ay is the most popular e-commerce destination on
the Internet, with over 100,000,000
items for sale or auction at any given time. The online company is dedicated to
eliminating the need for a middleman in trade, but also strives to provide a
safe and secure Internet experience. Users from all corners of the globe are
connected in a continually broadening marketplace through the membership of
eBay.
Types
o
As a matter of course, eBay allows "almost
anything on earth" to be traded, bought or sold through its channels. The
various categories of items you can shop for on eBay include art, antiques, computers, jewelry, clothing,
housewares, exercise equipment, cars, concert tickets, electronics and much
more. Over 6.4 million items are listed on eBay every day.
Trends
o
EBay allows its members and visitors to search
for the items they most desire before ever committing to a transaction. The
most popular items being searched and sold on eBay are mostly tech products,
such as the number one item, Nintendo's Wii game console, with over 2 million
units sold. Microsoft's XBox 360 was the second most popular item sold on eBay
with almost 1.3 million units sold. Rounding out the top five were NIntendo's
Wii Fit interactive game console, the iPod Touch by Apple and Sony's
Playstation Portable, also known as the PSP. Games for the Playstation, Wii and
XBox also made the top 10 items sold, the most popular of which is the latest
version of Guitar Hero, a video game that comes with a controller in the shape
of a Gibson guitar. Three advanced pocket personal computers made the list, two
by Blackberry--the Pearl and the Curve--and one by Apple, the iPhone 3G, each
selling an average of 200,000 units.
Q.3 Contract your Internet service provider in your
area And determine the procedure and cost of linking a company’s intranet of
internet.
Ans. - When I meet to Internet Service Provider that
according to him there is a procedure in which company establish intranet in
organization.
These processes are
–
A company intranet
can be an excellent way to disseminate information to employees, as well as to
foster the sharing of important data between departments. The key to a
successful intranet is to give every employee a compelling reason to use it.
Two NTCA members share their successes in getting their employees to regularly
use their intranets.
Some of the benefits
of an intranet are that it is cost-effective, efficient and gives employees
continuous access to the most updated company information, according to Katy
Pond, Web resource coordinator for ENMR Plateau Telecommunications. "[The
intranet] changes constantly. It ensures employees have access to the most
current information," he said.
Step by step
processes are—
Plan the Installation
- You can run ISA Server
Standard Edition on a stand-alone computer, on a computer that is a member
of a Microsoft Windows NT domain, or on a computer that is a member of an
Active Directory domain.
- For maximum security, run ISA
Server on a stand-alone computer.
- The configuration of the
network adapters involves setting up the external interface to the
Internet and then setting up the internal interface to your Windows-based
network.
- Your ISP should provide a
static IP address, subnet mask, default gateway, and Domain Name System
(DNS) server or servers. Enter this information in the TCP/IP settings of
the adapter that is connected to your ISP. Some ISPs prefer to assign this
information with Dynamic Host Configuration Protocol (DHCP), which is
fine.
You will need a permanent address and appropriate subnet
mask for your internal network on the internal adapter (do not use DHCP on this
interface). Always leave this default gateway blank. The ISA Server computer
needs only one default gateway: the one that is configured on the external
interface or interfaces. Configuring a default gateway on the internal adapter
causes ISA to malfunction.
Install Microsoft
Internet Security and Acceleration Server
Use the ISA Server Setup Wizard
- In Windows Explorer,
double-click to open your CD-ROM drive.
NOTE: The ISA Server Setup Wizard starts automatically unless the auto-insert notification feature is turned off. If the wizard does not start automatically, navigate to the root directory of the CD-ROM, and then double-click the ISAAutorun.exe file to run it. Click Install ISA Server to start the process. - At the Welcome screen, click Continue.
Type the product identification number in the appropriate box. You can
locate this number on the back of the CD-ROM case.
- Read the license agreement,
and then click I Agree.
- Click Typical installation
for the installation type. This installs ISA services and the
administrative tools.
- Click Firewall mode.
ISA stops relevant services on the computer.
- Configure the local address
table (LAT) for ISA. Configuring the LAT requires careful consideration.
You are presented with two choices: Either construct the LAT or use the
Installer Wizard. Base your selection on the following conditions:
- If you know the subnet
(or subnets) that your internal network uses, type it here.
CAUTION: Do not click the Construct Table button! If you do, the LAT information that you entered will be overwritten. - If you do not know
your local subnets, click the Construct Table button. The ISA
Setup Wizard will determine the local subnets based on the computer's
routing table.
- Click to select the Add
the following private ranges check box if it is not already
selected.
- Click to select the Add
address ranges based on the Windows Server 2003 routing table if it
is not already selected.
- Click to clear check
box that contains the subnet that corresponds to the server's external
(Internet) interface.
Configure the Post-Installation State of ISA
To configure the following two components of an access
policy so that your clients can access the Internet, note the following:
- You have to configure at
least one site and content rule, in which you specify where users can go
and what kinds of content they can retrieve.
- You have to configure at
least one protocol rule, which specifies the kinds of traffic that is
permitted through ISA Server.
After installation, ISA creates a default site and content
rule that permits all clients access to all content on all sites all the time.
However, this is not enough for users to start surfing the Internet: You still
have not defined a protocol rule. Without this, no traffic is permitted through
ISA.
These costs are
incurred in company’s intranet to internet.
Q.4 Evaluate the Following sites:
·
Evaluate each site in terms
of colors scheme and the profile of organization as perceived by the visitor.
·
Does each site follow use of
the proper color for psychological effect or impact?
·
Is there is relationship
between colors and how conservative an organization is?
Ans.-
I want to answer this
question on the basis of -
Q. 5 Access www.ibm.com and valuate the service offered. For
the first time business on the internet which service would you recommend the
new e merchant the new e-merchant consider?
Ans –
When I visited ibm.com then I
saw this window
Services-
IBM services span
the Telecom, Banking, Insurance, Distribution, Channel and Industrial sectors.
Our expertise lies in the field of Customer Relationship Management (CRM)
services like Customer Service, Collections and Customer Tech. Support.
Besides this, IBM
also specializes in Finance & Accounting (F&A), Analytics Services,
Managed Tech. Support and Industry-specific back-office solutions. More than 75
clients around the world use our asset-based solutions through our delivery
centers.
IT
services
- Business
continuity and resiliency
- Data
center services
- Integrated
communications services
- Maintenance
and technical support services
- Security
services
- Strategy
and design services
- Workplace
services
Other
services
Business
consulting
- Business analytics and
optimization
- Finance
- Human resources
- Marketing, sales and
service
- Strategy and
transformation
- Supply chain
|
|
Q. 6 Assume you have been asked to served as a
consultant for a local grocer interested in launching an online business on the
internet .Develop a security plan than
can be incorporated as part of technical infrastructure.
Ans.-
For opening a new grocery store online there is a need of a good and
effective security plan this plane
A computer network
assessment will help us begin a security plan to mitigate the largest risks to
your business. A security plan needs to be developed by an employee or a
contractor that has a basic understanding of
security.
A comprehensive
cyber security plan needs to focus on three key areas:
- Prevention. Solutions, policies and
procedures need to be identified to reduce the risk of attacks.
- Resolution. In the event of a computer
security breach, plans and procedures need to be in place to determine the
resources that will be used to remedy a threat.
- Restitution. Companies need to be prepared to
address the repercussions of a security threat with their employees and
customers to ensure that any loss of trust or business is minimal and
short-lived.
Now, the crux of the
matter in security. There are still many computer users who are afraid to shop
online and are afraid to give their credit card numbers online. Well, I have
some good news for you.
First of all, if you plan on doing a lot of shopping online, but don't want to over-extend yourself - get a debit card from your bank. Ask them for one. That way you will only buy what you have money in the bank to cover. Once you get used to shopping online, it is very easy to over-extend yourself if you have a credit card with a large credit line. Almost all online stores now accept debit cards and it really is the best way to shop.
Make sure the debit card you get is a "major" card like Visa or MasterCard. When you shop, pick out the major or national chain stores to shop in. They are all safe to deal with. Once you get used to the idea, you will find that shopping online with a credit card is much safer than shopping in a store in person. When you put your credit card number in an online store, for instance like Sears, it is mmediately encrypted AND IT DOES NOT GO TO SEARS AT ALL. It goes directly (encrypted) into Visa or MasterCard who in turn checks it's validity and then let's Sears know that it is valid. It all takes only a few seconds before anyone has a chance to see it. (This is why I said DO NOT LET THE STORES STORE YOUR CREDIT CARDS!) Now, the only way a hacker can get your card is by hacking into Visa or MasterCard and, in that case, this would include the card you use at in-store shopping anyway, as well as online shopping. I think that would take some doing. Even if a hacker could do it, with the millions upon millions of cards they have, the odds of yours being chosen would be like trying to win the lottery, pretty slim.
Now compare online shopping to shopping at the store in person. The sales clerk not only sees your card, but has a copy of the number in the sales receipt which is stored there by her cash register for any clerk to see until the receipts are sent to the office. And then, how many people in the office see your receipt with your credit card number on it? Several handlers probably, the computer operator who posts your sales transaction, the accountant who handles the books, etc. Now what seems safer to you?
2. Now The Last Piece of Information To Complete Your Security-Safe Passwords
The tendency is to find a really neat password and use it for everything, mainly because it's easier to remember. No. No. No. If someone cracks your password, they can get into everything. You need to have unique passwords, especially if you bank online, have a stock plan or retirement plans online or some program that is really sensitive. I have a couple of doozies for my bank account and my PayPal account. I can never remember them and look them up each time I use them. It must be unique and should be at least 8 digits long, preferably 12 with both letters and numbers. No problem with trying to remember them anymore because of the "neat little trick" I showed you using the Rolodex. Keep the Rolodex right by your computer and it just takes a second to flip to the one you're looking for. You can go really wild now with your creativity, because you are no longer going to be using the same password. You're going to make up new ones everytime you join something on the Internet. Nothing will protect you more than this. This is the way to create passwords.
Right now, on my desk, is a gas bill, 3 cookies and a calendar. Okay, how about gas3calendar. There's 12 letters. Lets make it more secure. My gas bill is $20.93. Not usually that low. How about 293gas3calen. Now there's a 12 digit password that would be hard to crack. There is nothing in there that relates to you, your dog, your birthdate (I don't think), your house number, your zip code. Now that's a perfect password. You could even go further and add 4 numbers to the end of it and make it a 16 digit password. Most passwords are case sensitive and you could capitalize a letter, for instance you could make that last one 293gAs3caLen. Let me give you one more example. On my rug, I have a paisley pattern and I would guess it repeats itself about 100 plus times. Each pattern has 5 loops on it. How about 100plus5paisley. That has 15 letters in it. Or 100plUs5paIsleY. Another very difficult one for someone to crack. On my kitchen counter I have 3 eggs sitting waiting to be scrambled and a picture of my daughter with her 2 children. She's got a bright pink blouse on. You could make several passwords from that. egGs33pinK242524. 3 eggs, 3 children, (33) pink blouse and their ages all "scrambled" up. I don't know about you, but I've never heard of pink eggs before. I doubt too many other people have either, except maybe Dr. Seuss. Be very careful when you print the password into your Rolodex between the small letters and the capital letters. I think you've got the idea.
First of all, if you plan on doing a lot of shopping online, but don't want to over-extend yourself - get a debit card from your bank. Ask them for one. That way you will only buy what you have money in the bank to cover. Once you get used to shopping online, it is very easy to over-extend yourself if you have a credit card with a large credit line. Almost all online stores now accept debit cards and it really is the best way to shop.
Make sure the debit card you get is a "major" card like Visa or MasterCard. When you shop, pick out the major or national chain stores to shop in. They are all safe to deal with. Once you get used to the idea, you will find that shopping online with a credit card is much safer than shopping in a store in person. When you put your credit card number in an online store, for instance like Sears, it is mmediately encrypted AND IT DOES NOT GO TO SEARS AT ALL. It goes directly (encrypted) into Visa or MasterCard who in turn checks it's validity and then let's Sears know that it is valid. It all takes only a few seconds before anyone has a chance to see it. (This is why I said DO NOT LET THE STORES STORE YOUR CREDIT CARDS!) Now, the only way a hacker can get your card is by hacking into Visa or MasterCard and, in that case, this would include the card you use at in-store shopping anyway, as well as online shopping. I think that would take some doing. Even if a hacker could do it, with the millions upon millions of cards they have, the odds of yours being chosen would be like trying to win the lottery, pretty slim.
Now compare online shopping to shopping at the store in person. The sales clerk not only sees your card, but has a copy of the number in the sales receipt which is stored there by her cash register for any clerk to see until the receipts are sent to the office. And then, how many people in the office see your receipt with your credit card number on it? Several handlers probably, the computer operator who posts your sales transaction, the accountant who handles the books, etc. Now what seems safer to you?
2. Now The Last Piece of Information To Complete Your Security-Safe Passwords
The tendency is to find a really neat password and use it for everything, mainly because it's easier to remember. No. No. No. If someone cracks your password, they can get into everything. You need to have unique passwords, especially if you bank online, have a stock plan or retirement plans online or some program that is really sensitive. I have a couple of doozies for my bank account and my PayPal account. I can never remember them and look them up each time I use them. It must be unique and should be at least 8 digits long, preferably 12 with both letters and numbers. No problem with trying to remember them anymore because of the "neat little trick" I showed you using the Rolodex. Keep the Rolodex right by your computer and it just takes a second to flip to the one you're looking for. You can go really wild now with your creativity, because you are no longer going to be using the same password. You're going to make up new ones everytime you join something on the Internet. Nothing will protect you more than this. This is the way to create passwords.
Right now, on my desk, is a gas bill, 3 cookies and a calendar. Okay, how about gas3calendar. There's 12 letters. Lets make it more secure. My gas bill is $20.93. Not usually that low. How about 293gas3calen. Now there's a 12 digit password that would be hard to crack. There is nothing in there that relates to you, your dog, your birthdate (I don't think), your house number, your zip code. Now that's a perfect password. You could even go further and add 4 numbers to the end of it and make it a 16 digit password. Most passwords are case sensitive and you could capitalize a letter, for instance you could make that last one 293gAs3caLen. Let me give you one more example. On my rug, I have a paisley pattern and I would guess it repeats itself about 100 plus times. Each pattern has 5 loops on it. How about 100plus5paisley. That has 15 letters in it. Or 100plUs5paIsleY. Another very difficult one for someone to crack. On my kitchen counter I have 3 eggs sitting waiting to be scrambled and a picture of my daughter with her 2 children. She's got a bright pink blouse on. You could make several passwords from that. egGs33pinK242524. 3 eggs, 3 children, (33) pink blouse and their ages all "scrambled" up. I don't know about you, but I've never heard of pink eggs before. I doubt too many other people have either, except maybe Dr. Seuss. Be very careful when you print the password into your Rolodex between the small letters and the capital letters. I think you've got the idea.
Q. 7 Look up the website of Cyber Cash ( www.cybercash.com) and write a report about the company : Its
electronic pay system , basic infrastructure, price and so on.
Ans.
Payment system, Price and
basic infrastructure-
CyberCash has been servicing credit card transactions over
the Internet since April 1995. It has strong ties to the current credit card
processing infrastructure, through Bill Melton, a founder of Verifone, as one
of its fathers. The use of their payment system has grown tremendously over a
year. CyberCash claims that they process thousands of transactions a day, they
can send payment transactions to 80% of the banks in America, and to have
distributed over 400,000 copies of CyberCash Wallet software to buyers who use
their system.
It is important to note that CyberCash is not a credit card processing
company. Unlike First Virtual, they do not transfer funds into the merchant's
account. CyberCash sells safe passage over the Internet for credit card
transaction data. They take the data that is sent to them from the merchant,
and pass it to the merchant's acquiring bank for processing. Except for dealing
with the merchant through CyberCash's server, the acquiring bank processes the
credit card transaction as they would process transactions received through a
point of sale (POS) terminal in a retail store.The CyberCash payment system is centered around the CyberCash Wallet software program, which buyers use when making a purchase. This program must be downloaded and installed on the buyer's machine before they can make a purchase. This program handles passing payment information, encrypted, between the buyer and the merchant.
Once a potential buyer has obtained the CyberCash Wallet and installed it, there are still a few steps to take before it can be used. First, a buyer needs to create a persona or wallet ID which is a string of characters which identify the wallet, and a password. These are then registered with CyberCash. Buyers are allowed to create more than one wallet ID, each with its own password. Secondly, they must bind at least one credit card to the wallet. Binding a credit card entails entering pertinent credit card processing information such as credit card number, expiration date, shipping address and phone number. This information is then registered with CyberCash. Buyers can bind multiple credit cards to the wallet. Once the wallet ID is established, and at least one card has been bound, the buyer is ready to start purchasing.
To be able to accept payment using the CyberCash system, merchants must do two things. First, the merchants must install the CyberCash Internet Payment Software (SMPS). This software allows the merchant to interface with both the CyberCash buyer, or Wallet software, and CyberCash's servers. Secondly, the merchant must establish a merchant account with an acquiring bank that supports Internet transactions using CyberCash's Secure Internet Payment System. CyberCash can only communicate with banks they have an agreement with. The requirements for accepting payments through CyberCash are provided in detail in CyberCash's How to become a CyberCash Merchant document.
Steps to a credit card purchase using CyberCash's payment system:
- The buyer indicates that
they want to purchase an item from the merchant's WWW site by clicking on
the CyberCash pay button.
- The merchant's SMPS
software sends an invoice to the buyer's CyberCash Wallet software.
- The CyberCash Wallet
is registered as a helper application to the buyer's WWW browser. It is
invoked by the browser whenever it downloads a file with the MIME content
encoding of application/x-cybercash.
- The buyer selects a credit card from the ones bound to their wallet and clicks OK
- The Buyer's CyberCash
Wallet then digitally signs and encrypts the invoice and credit card
information with the key assigned to that Wallet-ID. The encrypted packet
is then sent to the Merchant's SMPS software.
- The merchant software adds
information to the payment packet requesting that either the credit card
payment be authorized or authorized and captured.
- Under normal credit
card operating procedures, i.e.. a merchant using a POS terminal, the
merchant only receives authorization when the sale actually happens, and
then that night sends all the credit card payments to the acquiring bank
to be captured.
- CyberCash is working
on allowing batch capture processing and may have it in place by the time
you read this.
- The merchant's SMPS
software digitally signs and encrypts the payment packet with their
CyberCash key. The packet is then sent to the CyberCash server.
- The merchant never
sees the customers credit card number.
- The payment packet
is encrypted twice before arriving at CyberCash's server, once by the
buyer's software and once by the merchant's.
- CyberCash's server moves
the packet to a machine that resides behind their firewall and off the
Internet. CyberCash then decrypts the message and checks to make sure that
the merchant has not tampered with the original invoice agreed upon by the
buyer.
- The credit card
information, with the merchant's request (authorize or authorize and
capture), is encrypted using hardware that banks use for encrypting
financial data. This information is sent over dedicated lines to the
merchant's acquiring bank.
- The merchant's acquiring
bank then processes the merchant's request as it would any other credit
card transaction. It forwards the request through the card associations
network to the card issuing bank.
- Discover and
American Express cards are not associated with an issuing bank.
Authorizations and captures are performed through the card company itself
for these particular cards.
- The card-issuing bank sends
an approval or denial code back to the acquiring bank. The acquiring bank
then sends this code to CyberCash. .