Current location - Trademark Inquiry Complete Network - Trademark registration - How to build a complete e-commerce system
How to build a complete e-commerce system

Building an e-commerce information security technology framework system (1) Firewall technology is the most important security technology developed in recent years. It is used to strengthen access control between networks and prevent external network users from using illegal means to pass through the external network. The network enters the internal network (protected network). Firewall technologies mainly include packet filtering, proxy services, status monitoring and other technologies. The main advantages of firewall technology are: improving network security and reducing risks to hosts in subnets by filtering unsafe services; providing access control to the system; blocking attackers from obtaining useful information about attacking network systems; recording and statistics of traffic passing through it Network communication provides statistical data about network usage, and determines possible attacks and detections based on statistical data; provides means to formulate and implement network security policies, and achieves centralized security management of corporate intranets. (2) Information encryption technology, as a proactive information security precaution, uses encryption algorithms to convert plain text into meaningless cipher text, preventing illegal users from understanding the original data, thereby ensuring the confidentiality of the data. (3) Digital certificates and authentication technology are a series of data that mark the identity information of communicating parties in network communications. A strict identity authentication system is established by using symmetric and asymmetric cryptography systems. It has many functions such as that information cannot be stolen by others except the sender and receiver; information cannot be tampered with during transmission; the sender can confirm the identity of the receiver through a digital certificate; the sender cannot deny the information it sends, etc. . In addition, the sender of the message generates a hash value of a specific length from the message text, and the sender uses its own private key to hash the hash value. The value is encrypted to form the sender's digital signature. Through the digital signature, the integrity identification and non-repudiation of the original message can be achieved, and the identification and verification of electronic documents can be realized. (4) Among security protocols, Secure Socket Layer (SSL) is a secure communication protocol. SSL provides a secure connection between two computers, encrypting the entire session, ensuring the safe transmission of information. The secure connection it provides has three characteristics: the connection is confidential, there is a unique session encryption for each connection, and a symmetric cryptography system is used to encrypt data; the connection is reliable, and the message transmission uses an information verification algorithm for integrity Verification; the identification of the peer entity uses an asymmetric cryptographic system for authentication. Secure Electronic Transaction (SET) is a technical standard for secure fund payments through open networks. SET provides rules for implementing security measures to applications that conduct electronic transactions based on credit cards: information is transmitted securely on the Internet to ensure that the transmitted data is not stolen by hackers. ;The order information and personal account information are separated. When the order containing the cardholder's account information is sent to the merchant, the merchant can only see the order information, but not the cardholder's account information; the cardholder and the merchant interact with each other. Authentication is used to determine the identity of both communicating parties. Generally, a third-party organization is responsible for providing credit guarantee for both parties in online communication. The software is required to follow the same protocol and message format so that software developed by different manufacturers has compatible and interoperable functions and can run on on different hardware and operating system platforms.