亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? ch31.htm

?? this explains the working of intranets.
?? HTM
?? 第 1 頁 / 共 2 頁
字號:
Intranets are used not merely to streamline businesses and makethem more effective, but as a place to do business as well-totake orders for goods and services and to fill orders for goodsand services. In order for this to happen, though, a secure waymust be designed for credit card information to be sent over thenotoriously unsecured Internet. There are many methods for doingthis, but one standard, called the Secure Electronic Transactionprotocol (SET), will probably be the primary method used. It hasbeen endorsed by VISA, MasterCard, America Express, Microsoftand Netscape, among other companies. It is a system that willallow people with bank cards to do secure business over intranets.This illustration shows how a transaction using SET might work.<OL><LI>Mia visits a Web site that contains an electronic catalog.After browsing through the catalog, she decides that she wantsto buy a camcorder. In order to use SET to pay for it, she willhave to have a credit card from a participating bank and havebeen issued a unique &quot;electronic signature&quot; for hercomputer that will be used to verify that it is she, and not animpostor, that is making the purchase. In SET, everyone involvedin the transaction, including the merchant, needs to have electronicsignatures identifying them and software that supports the SETprotocol. SET also uses public-key encryption technology to encryptall the information sent among everyone involved in the transaction.See <A HREF="ch17.htm" >Chapter 17</A> for details on encryption.<LI>Mia fills out an order form detailing what she wants to buy,its price, and any shipping, handling, and taxes. She then selectsthe method she wants to use to pay. In this case, she decidesto pay electronically over the Internet, with her SET bank card.At this point, she doesn't send her precise credit card number,but instead the name of which credit card she wants to use. Theinformation she sends includes her electronic signature, so thatthe merchant can verify it is really Mia who wants to do the ordering.<LI>The merchant receives the order form from Mia. A unique transactionidentifier is created by the merchant's software, so that thetransaction can be identified and tracked. The merchant's SETsoftware sends back to Mia's computer this identifier along withtwo &quot;electronic certificates&quot; which are required tocomplete the transaction for her specific bank card. One certificateidentifies the merchant, and the other certificate identifiesa specific <I>payment gateway</I>-an electronic gateway to thebanking system that processes online payments.<LI>Mia's software receives the electronic certificates and usingthem creates Order Information (OI) and Payment Instructions (PI).It encrypts these messages and includes Mia's electronic signaturein them. The OI and the PI are sent back to the merchant.<LI>The merchant's software decrypts Mia's Order Information and,using the electronic signature that Mia sent, verifies that theorder is from her. The merchant sends verification to Mia thatthe order has been made.<LI>The merchant's software creates an authorization request forpayment, and includes with the merchant's digital signature, thetransaction identifier and the Payment Instructions received fromMia's software. The software encrypts all of it and sends theencrypted request to the Payment Gateway.<LI>The Payment Gateway decrypts the messages, and using the merchant'sdigital signature verifies that the message is from the merchant.By examining the Payment Instructions, it verifies that they havecome from Mia. The Payment Gateway then uses a bank card paymentsystem to send an authorization request to the bank which issuedMia her bank card, asking if the purchase can be made.<LI>When the bank responds that the payment can be made, the PaymentGateway creates, digitally signs, and encrypts an authorizationmessage, which is sent to the merchant. The merchant's softwaredecrypts the message, and uses the digital signature to verifythat it comes from the Payment Gateway. Assured of payment, themerchant now ships the camcorder to Mia.<LI>Some time after the transaction has been completed, the merchantrequests payment from the bank. The merchant's software createsa &quot;capture request,&quot; which includes the amount of thetransaction, the transaction identifier, a digital signature,and other information about the transaction. The information isencrypted and sent to the Payment Gateway.<LI>The Payment Gateway decrypts the capture request and usesthe digital signature to verify it is from the merchant. It sendsa request for payment to the bank, using the bank card paymentsystem. It receives a message authorizing payment, encrypts themessage, and then sends the authorization to the merchant.<LI>The merchant software decrypts the authorization, verifiesthat it is from the Payment Gateway, and then stores the authorizationwhich will be used to reconcile the payment when it is receivedas it normally is in credit card transactions from the bank.</OL><H2><A NAME="DoingBusinesswithCustomersUsinganIntranet"><FONT SIZE=5 COLOR=#FF0000>Doing Business with Customers Using an Intranet</FONT></A></H2><P>Intranets may revolutionize the way that businesses sell goodsand services. Using an intranet, a company can inexpensively marketits goods and services, take orders for them, and then fulfillthe order. This illustration shows how a record company calledCyberMusic could do business using an intranet.<UL><LI>CyberMusic creates a public Web site on a bastion host inthe firewall of the intranet that it uses as a way to draw customers.To get people to visit, it features interviews with musicians,music news, concert calendars, music clips, and contests.<LI>To further draw people to the site, CyberMusic advertisesits site on the Internet. When anyone clicks on an ad for CyberMusic,they are immediately sent to the CyberMusic Web site.<LI>When the person is done browsing, they go to the electroniccheckout counter to pay for the items they've selected. The CGIshopping cart program sends a list of the cart's contents to thecheckout counter.  The buyer fills out a form that includes informationsuch as their name and address and method of payment. This informationis encrypted and sent from the Internet to the intranet throughthe firewall. The transaction is a secure one because it usesthe SET protocol.  The orderer, merchant, and credit card companythen complete the payment following the illustration on the previouspage.<LI>Information about the order is automatically transferred overthe intranet to CyberMusic's fulfillment department, which shipsout the records ordered.<LI>The site features an electronic catalog that promotes therecords that CyberMusic sells. The catalog features music clipsso that people can sample records, and has information about thealbum and its artist. To select an item from the catalog, someonemerely needs to click on a link or a button. When this is done,the item is placed in their electronic shopping cart.  As theybrowse through the catalog they can place more items in theirelectronic shopping cart.  A CGI program on the CyberMusic Website keeps track of the contents of each individual's shoppingcart.<LI>Instead of browsing through a catalog, people can do a focusedsearch on the kind of music they're interested in. They can searchby type of music, particular artist, date of release and otherterms. The search can be done via a variety of database searchingtechniques, including CGI scripting and SQL technology, both coveredin earlier chapters. When they find the album they want to buy,they need to click on a link or a button to drop the item in theirelectronic shopping cart.</UL><H2><A NAME="BusinesstoBusinessTransactionsUsingIntranets"><FONT SIZE=5 COLOR=#FF0000>Business-to-Business Transactions Using Intranets</FONT></A></H2><P>Intranets can communicate with one another through the publicInternet, instead of by using private leased lines. Leasing privatelines can be very expensive, while using the Internet is inexpensive.However, of vital importance when companies do business with oneanother using in-tranets is that any transactions be kept privateand secure. Virtual Secure Private Networks (VSPNs) allow intranetsto communicate with one another over the Internet, while keepingall data secure, by using &quot;tunneling&quot; technology. See<A HREF="ch20.htm" >Chapter 20</A> for details on how VSPNs work.<OL><LI>When a business wants to order goods from CyberMusic-suchas a music store called The Music Box-it contacts the CyberMusicintranet using a VSPN. It can search through the database of CyberMusicrecords to find the records it wants to order. A CGI program givesthem a special retailer's view of the data shown to regular customers.<LI>As a further way to en-sure that the transaction is kept secure,and that it is really The Music Box doing the ordering, a specialelectronic &quot;token&quot; (like the digital signatures describedearlier in the chapter) may be required that proves that the purchaseris indeed The Music Box. The token is sent over the VSPN.<LI>When The Music Box finds the records it wants to order, itfills out a form. This form may be customized specifically forThe Music Box, and will be different from the form used by thegeneral public, and by other companies that do business with CyberMusic.<LI>Once it is verified that The Music Box is doing the ordering,the transaction is put through using a secure payment system.There are a variety of secure payment systems that can be usedfor business-to-business transactions. One is de-scribed in &quot;HowFinancial Transactions Work on an Intranet.&quot;<LI>Information about the order is automatically transferred overthe intranet to CyberMusic's fulfillment department, which shipsout the records ordered.<LI>CyberMusic can also do business with its suppliers and contractorsusing an intranet. For example, it can post on its public InternetWeb server the fact that it is looking to buy raw, uncut CDs thatit will use in the manufacturing process, and have new supplierssubmit bids over the Internet. Established suppliers can connectvia a VSPN, and submit their bids which are then routed to theappropriate people within the intranet.</OL><HR><CENTER><P><A HREF="ch30.htm"><IMG SRC="PC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="#CONTENTS"><IMG SRC="CC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="contents.htm"><IMG SRC="HB.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><A HREF="ch32.htm"><IMG SRC="NC.GIF" BORDER=0 HEIGHT=88 WIDTH=140></A><HR WIDTH="100%"></P></CENTER></BODY></HTML>

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩欧美一区二区久久婷婷| 日韩一区二区麻豆国产| 欧美性大战久久久久久久蜜臀| 欧美一级在线视频| 亚洲欧美日韩电影| 国产成人精品一区二| 欧美日韩国产bt| 亚洲色欲色欲www| 丰满岳乱妇一区二区三区| 欧美一区二区国产| 亚洲一区成人在线| 99视频有精品| 国产三级欧美三级| 激情综合网天天干| 91精品国产综合久久精品麻豆 | 亚洲精品第1页| 国产精品99久| 久久久www成人免费无遮挡大片| 天天色综合天天| 欧美精品日日鲁夜夜添| 亚洲一区二区视频在线观看| 91香蕉视频污| 亚洲三级在线观看| av资源网一区| 中文字幕一区免费在线观看| 国产成人丝袜美腿| 久久久久国产精品厨房| 精品一区二区三区在线播放| 欧美一区二区三区播放老司机| 亚洲国产精品久久不卡毛片 | 欧美日韩视频在线第一区 | 国产婷婷色一区二区三区四区| 极品少妇一区二区三区精品视频 | 午夜精品一区二区三区三上悠亚| 欧美制服丝袜第一页| 亚洲免费av高清| 99国产精品久久久| 亚洲欧美日韩电影| 在线视频欧美精品| 亚洲成人午夜影院| 正在播放亚洲一区| 六月婷婷色综合| 久久人人超碰精品| 成人av一区二区三区| 最新高清无码专区| 欧美曰成人黄网| 肉色丝袜一区二区| 欧美大度的电影原声| 国产在线看一区| 国产精品久久福利| 在线观看日韩高清av| 日韩电影在线一区二区三区| 精品成a人在线观看| 成人av免费观看| 亚洲一区在线观看免费 | 午夜在线电影亚洲一区| 欧美一区二区在线免费观看| 激情综合网av| 亚洲欧美另类图片小说| 51午夜精品国产| 国产高清无密码一区二区三区| 国产精品传媒入口麻豆| 欧美性猛交xxxxxx富婆| 国产又黄又大久久| 亚洲色欲色欲www在线观看| 欧美人妇做爰xxxⅹ性高电影 | 亚洲mv在线观看| 久久理论电影网| 91久久精品日日躁夜夜躁欧美| 日韩电影在线看| 国产精品视频看| 7777精品伊人久久久大香线蕉超级流畅 | 欧美一级国产精品| 国产成人在线视频免费播放| 一区二区三区四区av| 久久久美女艺术照精彩视频福利播放| 成人黄色网址在线观看| 五月天亚洲婷婷| 国产精品乱人伦| 日韩欧美中文字幕一区| 一本到一区二区三区| 精品亚洲免费视频| 亚洲一区二区综合| 国产精品久久久久久福利一牛影视| 欧美日韩高清在线播放| 91在线视频播放地址| 韩国女主播一区| 三级一区在线视频先锋| 亚洲视频中文字幕| 久久婷婷色综合| 欧美一激情一区二区三区| 在线观看一区二区精品视频| 成人小视频在线观看| 精品一区二区三区香蕉蜜桃| 亚洲五码中文字幕| 亚洲精品国产a久久久久久 | 午夜欧美大尺度福利影院在线看| 欧美激情资源网| 久久久综合九色合综国产精品| 7777女厕盗摄久久久| 欧美在线色视频| 在线亚洲免费视频| 99re热这里只有精品免费视频| 国产成人啪午夜精品网站男同| 热久久一区二区| 丝袜诱惑制服诱惑色一区在线观看 | 久久久久久久久一| 亚洲精品在线网站| 日韩欧美的一区| 日韩欧美黄色影院| 日韩欧美一二三四区| 欧美一区二区大片| 欧美一级片在线观看| 欧美一区二区三区系列电影| 91精品国产丝袜白色高跟鞋| 欧美日韩国产美女| 91精品蜜臀在线一区尤物| 日韩一区二区高清| 日韩美女主播在线视频一区二区三区 | 免费观看成人av| 日韩高清在线电影| 蜜臂av日日欢夜夜爽一区| 老司机一区二区| 另类小说视频一区二区| 韩国av一区二区三区| 国产91精品一区二区麻豆网站| 国产伦精品一区二区三区视频青涩| 韩国欧美国产1区| www.亚洲激情.com| 色婷婷亚洲婷婷| 91精品欧美一区二区三区综合在| 日韩欧美国产麻豆| 国产喂奶挤奶一区二区三区| 国产精品伦理一区二区| 亚洲一区视频在线| 久久99精品久久久| 成人黄色在线视频| 在线精品视频小说1| 在线成人午夜影院| 久久先锋影音av| 亚洲黄色av一区| 日韩国产成人精品| 高清成人在线观看| 欧美三级韩国三级日本三斤 | 精品一区二区三区视频在线观看| 国产成人免费视频网站| 色视频欧美一区二区三区| 日韩一级高清毛片| 中文字幕在线视频一区| 五月天丁香久久| 国产成人精品免费网站| 欧美系列亚洲系列| 久久久久久久性| 午夜国产精品一区| eeuss鲁片一区二区三区在线观看| 欧美视频在线播放| 国产精品女同互慰在线看| 亚洲超丰满肉感bbw| 国产福利91精品一区| 欧美另类videos死尸| 国产精品免费人成网站| 奇米色777欧美一区二区| 色综合天天综合网天天狠天天| 日韩一区二区在线看| 亚洲美女视频一区| 国产伦精品一区二区三区免费迷 | 久久久亚洲国产美女国产盗摄| 一区二区三区日韩在线观看| 国产麻豆91精品| 欧美老年两性高潮| 日韩伦理免费电影| 亚洲色图一区二区三区| 国产精品一线二线三线精华| 欧美人与禽zozo性伦| 国产精品国产a级| 国产精品亚洲一区二区三区妖精| 欧美精品乱码久久久久久按摩| 亚洲丝袜制服诱惑| www.久久精品| 国产日韩欧美在线一区| 美女视频一区二区| 欧美一区二区三区人| 一区二区三区欧美视频| 成人短视频下载| 欧美激情综合五月色丁香| 国内精品伊人久久久久av一坑| 3751色影院一区二区三区| 亚洲一区二区三区小说| 91美女片黄在线| 综合av第一页| jvid福利写真一区二区三区| 国产欧美一区二区三区在线老狼| 国产一区二区中文字幕| 精品久久久久久无| 久久99精品久久久久久国产越南| 日韩一级高清毛片| 精品无人区卡一卡二卡三乱码免费卡| 91精品国产高清一区二区三区蜜臀 | 在线看国产一区二区| **网站欧美大片在线观看|