首页 > > 详细

讲解 Secure Payment Method讲解 Java编程

Q1.Secure Payment Method Integration (Marks 18)

Assume that Alice has an E-Commerce Website where she sells different electronic bike.Initial HTMLand PHP pages of Alice's E-Commerce Website are provided in the CANVAS.Please refer to the following Figure-1.1 as an example of the

Figure-1.1:Product List Page of Alice's Electronic Bike ShopWebsite

When a customer clicks the “BUY”button of an item,the customer is forwarded to the following Shopping Cart page (see Figure-1.2) showing the selected items.Once the user clicks the “CHECKOUT NOW” button,it  should  go to the

Billing Information page(see Figure-1.3).


Figure-1.2:Shopping Cart Page of Alice's E-Commerce Website

Figure-1.3:Shopping Cart Payment Page of Alice's Electronic Bike Shop Website

In order to increase sales of her E-Commerce Website,she wants to include different types of payment options such as PayPal,MasterCard,Visa,AmEx,Google Pay,Apple Pay,Alipay,etc.Pleaserefer to the tutorials on integrating PayPal and Google Pay integrations asexamples.

In this task,you need to integrate at least four different payment options in the given e-commerce application,two of which should be PayPal and Google Pay.To fulfil the requirements of this task you need to perform. the followings:

(a)Upload  the  final  files  (e.g.,HTML,PHP,and  JavaScript. files)as  attachment  in  the  CANVAS  along  with  your assignment submission.

(b)In  the  assignment  solution,provide  step-by-step  guidelines  of  integrating  the  selected  four  payment  options   with appropriate codes and screenshot of your output pages.You must demo the solution ofthis question to your tutor as a group.Date and time of demo will be announcedseparately.No demo,no marks.Please  note that you do not need to provide any video of the demonstration.

Q2.Multi-Signature (Marks:10)

Imagine Alice,Bob,and  Karen  share  a  business.They  have  decided  that whenever they  purchase  something  for the business everyone must approve thetransaction.They have made that known to their bank AusBank.The bank isaware that a check will have signatures ofall for it to be valid.A typical blank check is shown below (see Figure-2.1).

Figure-2.1:A typical blank check

(a) Scenario-1:Assume that Alice,Bob,and Karenwant to issue a bank check of S100,000 in favourof XYZ company.   To make it clear, XYZ isthe payee,the payable amount is $100,000,and Alice,Bob,and Karen are the payers of the check.The name of payee and the amount are printed on the check as shown in Figure-2.2.The checkmustbe

signed by each payer.Each payer hasa public and private keypair that is generated using a Public-Key

cryptosystem.Each payer will sign the message“100000”with theirrespective private key and generate a digital signature for the message.Bank knows the public keys of each payer.You arerequired to perform. the following   tasks:

i.     For each  payer,show  detail  computations of each step for generating digital signatures for the above message  (M  =100000)using  suitable  key  parameters  (i.e.,you  are  allowed  to  choose  the  requirec parameters by yourown).

ii.    Assume three digital signatures will be embedded somewhere on the blank space of the check as shown ir Figure-2.2. Show how the bank will verify the signatures before deciding to accept/reject the digital check Detail computations mustbe shown.

Figure-2.2:The bank check with payee name and amount containing digital signatures ofpayers:Alice, Bob,and Karen

(b) Scenario-2: With the situation mentioned in Scenario-1 (see Q2(a) ,Bankis worried that they have to verify three signaturesseparatelyeverytime a check comes from payers (i.e.,Alice,Bob,and Charlie).In order to reduce computational burden,Bank wants to verify just one signature.Payers are alsoeager to combine three signatures intoone as shown in Figure-2.3. How can this be accomplished with multi-signature?Explain the process and show detailed computations of each step.

To illustrate the process (Signing and verification of payment message using Multi-Signature)and show detailed computations of each step,a diagram should be used.This diagram should include all the necessary information  that applies to the process as well as the calculations that are required.This demonstrates a visual representation  of the process and provides a way to easily track every step.The process should be identified and broken down into each component,and mathematical calculations should be provided for each part as a means of determining the results.Having this information presented in a clear and concise manner can help to understand the process more effectively.

Figure-2.3:The bank check with payee nameand amountcontaining Multi-Signatures of payers:Alice,Bob,and Karen

Q3.Designing Reliable E-Commerce Systems (Marks 5)

An E-commerce company is setting up online business.They are expecting lots of clients to visit their website at the same time for purchasing items online.The company understands that the“n-tier architecture”is an industry-proven software architecture model.The architecture model is suitable to support enterprise level client-serverapplications by  providing solutions to scalability,security,fault tolerance,reusability,and  maintainability.It  helps  developers  to  create flexible and reusable applications.

Based on the above understanding,the company has decided to build a 3-tier robust E-commerce site as shown in Figure-3 to  handle  large  number  of  e-transactions.The  first  tier,called  web-server  cluster,consists  of  a  number  of web-servers as application front-end.The second tier is known as application-server cluster and the third tier is named

as database-server cluster.Similar to the first tier,both second and third tiers have a number of servers.Having multiple

servers in every tier,offers higher reliabilityto the tier itself and to the overall multi-tier E-commerce system.

Figure-3:Three-tier E-Commerce System

However,company is running short of cash,and can only afford to buy old computers having only 75%(i.e.,0.75) reliability.Despite   this,the   company    is   determined    to   build    a   web-server   cluster   with 99.999% reliability,

application-server cluster with 99.99% reliability,and database-server cluster with 99.9% reliability.Based  on  the requirement of the company,you need to determine the followings by showing detail computations:

a)How many serverswould be required for different clusters?

b)What would be overall reliabilityof the 3-tier E-commerce system?

Q4.Secure Identification in E-Commerce Application (Marks 7)

Assume a real-lifelike scenario where Alice goes to wonderland for shopping and having fun.Usually,she caries a debit card issued by XYZ bank and withdraws cash from ATM to purchase something.There are plenty of XYZ banks and ATM machines in wonderland.One day,while she was in a shopping mall,she realizes that her wallet is no longer in the pocket ofher jacket.She has lost not only herATM card but also all the ID cards.So,going to the bank and showing her ID card to prove her identity is not an option.The only thingshe has is her mobile phone whichcan perform. large mod calculation.She is embarrassed and disappointed.

She then remembers the advice given by the bank when she is in a difficult situation like this.The bank advised her to go to any branch office ofXYZ and prove to them that she knows a secret without revealing the secret.They explained her the protocol.So,Alice goes to a branch office of XYZ and talks to branch officer Bob to prove that she knows a secret without revealing it.

How can the bank facilitate this with help of zero-knowledge-proof (ZKP)protocol?Assume bank is the trusted third party(TTP)deploying zero-knowledge-proof (ZKP)protocol,Alice is the prover and Bob is the verifier.Show all the steps in details and sequence diagram to illustrate how Alice convinces Bob.Also,show what the bank must prepare in advance to facilitate this.

Q4.Secure   Identification    in    E-Commerce   Application    (Marks    7)

Assume a real-lifelike scenario where Alice goes to wonderlandfor shopping and having fun.Usually,she carries a debit card issued by XYZ bank and withdraws cash from ATM to purchase something.There are plenty of XYZ banks and ATM  machines in wonderland.One day,while she was in a shopping mall,she realizes that her wallet is no longer in the pocket of her jacket.She has lost not only herATM card butalsoall the ID cards.So,going to the bank and showing her  ID card to prove her identityis not an option.The only thingshe has is her mobile phonewhichcan perform. large mod  calculation.She is embarrassed and disappointed

She then remembers theadvice given bythe bank when she is in a difficult situation like this.The bank advised her to go to any branch office of XYZ and prove to them that she knows a secret without revealing the secret.They explained her the protocol.So,Alice goes to a branch office of XYZ and talks to branch officer Bob to prove that she knows a secret without revealing it.

How can the bank facilitate this with help of zero-knowledge-proof (ZKP)protocol?Assume bank is the trusted third party(TTP)deploying zero-knowledge-proof (ZKP)protocol,Alice is the prover and Bob isthe verifier.Show all thesteps in details and sequence diagram to ilustrate how Alice convinces Bob.Also,show what the bank must prepare in advance to facilitate this.


联系我们
  • QQ:99515681
  • 邮箱:99515681@qq.com
  • 工作时间:8:00-21:00
  • 微信:codinghelp
热点标签

联系我们 - QQ: 99515681 微信:codinghelp
程序辅导网!