Authentication
26 نوفمبر 2021 2021-11-25 23:10Authentication
What is authentication in e-commerce activities?
shopper or seller needs to be assured that the other person or entity in fact the intended one to avoid fraud
The authentication process always runs at the start of the application, before the permission and throttling checks occur, and before any other code is allowed to proceed. Different systems may require different types of credentials to ascertain a user’s identity. The credential often takes the form of a password, which is a secret and known only to the individual and the system. Three categories in which someone may be authenticated are: something the user knows, something the user is, and something the user has.
Authentication is one of the effects of the business process, and it brings them together, and they are the real people, to be through the eye print or the destination and one of them through the seller and the identity he follows, which is necessary in online commerce
Authentication establishes the identity of one party to another and is a core set of activities used to verify product quality and features, the authenticity of the trading parties, and monitor conformance to the contract or agreement among parties
The role of authentication in electronic commerce, its conceptual framework, and the open problems in current authentication are discussed. Authentication establishes the identity of one party to another and is a core set of activities used to verify product quality and features, the authenticity of the trading parties, and monitor conformance to the contract or agreement among parties. Online buyers and sellers need to get authentication information about each other and verify the truthfulness of this information. Overall buyer authentication in electronic commerce is achieved through credit cards and digital certificates approved by financial institutions. Seller authentication involves URL, advertising, and virtual communities, while product authentication is achieved through product try-outs. Some of authentication problems include lack of robust overall product authentication, the trustworthiness of the trusted third parties, and situations wherein one party or both of the parties to the transaction seek anonymity.