Skip to main content

Secure Electronic Transaction (SET)

SECURE ELECTRONIC TRANSACTION (SET)

A protocol designed to ensure the security and integrity of online communications and purchases, Secure Electronic Transaction (SET) uses digital certificates, issued to merchants and other businesses and customers, to perform a series of security checks verifying that the identity of a customer or sender of information is valid. SET provides the basic framework within which many of the various components of securing digital transactions function. Digital certificates, digital signatures, and digital wallets all function according to the SET protocol.

There are several components for the SET protocol.

  • The Cardholder Application, also referred to as a digital wallet, is held by an online consumer and packages a digital signature and credit card information that ensures his or her identity and safeguards his or her financial information through a complex encryption system.
  • The Merchant Server component is the verification product held by the merchant to process the online card payment.
  • The Payment Gateway component is held by an acquiring bank or other trusted third party that accepts and processes the merchant's verification and the customer's payment information and filters them to their appropriate financial institutions.
  • The Certificate Authority component, usually run by a financial institution, is the trusted agent that issues the digital certificates and is responsible for ensuring that all users of digital certificates are in fact secure and trustworthy customers.

Once a security product for any of these components has passed the SET Compliance Testing, it bears the SET Mark, ensuring all users that it meets the SET standards.

SET is an open standard available to anyone engaged in electronic commerce. MasterCard International and Visa International, recognizing that security was the key to the widespread use of credit cards for e-commerce, developed the SET protocol, which was launched on February 1, 1996. The first version of the SET Specification was published in May 1997. In December of that year, the credit-card giants and other major players in the e-commerce world, including Microsoft, Netscape, and IBM, set up a company called SET Secure Electronic Transaction LLC (SETCo) to maintain and implement the SET specification, administer compliance testing, and foster the increased global adoption of the SET standard.

Following the great fanfare that accompanied its launch, the adoption of the SET protocol proved greatly disappointing, and the standard was passed over by rival protocols such as the Secure Sockets Layer (SSL) encryption scheme. The primary obstacle to SET's widespread adoption in the United States and Europe in the late 1990s was the lack of feeling, among bankers and merchants, that fraud and security breaches posed so substantial a threat as to make the turn toward SET worthwhile. SET's procedures were viewed as too cumbersome to implement relative to comparative security protocols, and even though SET was ultimately the strongest technology for securing online payments, businesses tended toward the less sophisticated models as a means of establishing for themselves an online presence. As Barbara Smiley, research director at Newton, Massachusetts-based Meridien Research Inc., told Computer World in 1999, "for most people, SET is a nuclear warhead for a problem that may only need a cruise missile." SET was widely seen as too inflexible for what merchants widely saw as only a mild threat of online-payments fraud.

By the 2000s, however, reports of credit-card fraud and abuse rekindled interest in the SET protocol, and companies and card suppliers began integrating SET into their transactions systems. One factor helping the resurgence of the SET standard in the early 2000s was the switch from client-side digital wallets to server-side wallets, allowing for far greater flexibility in their use and for data storage. And as more and more consumers opt to use debit cards, rather than credit cards, for their online purchases, the demand for tighter security will only escalate. In credit-card transactions, the payment is actually drawn from a line of credit provided by the card issuer, while, for debit-card payments, it is the consumer's own money that is directly involved. Therefore, nervous customers will require the strongest possible security protocol for their online payments.

FURTHER READING:

"SET Secure Electronic Transaction LLC." Purchase, NY: SET Secure Electronic Transaction LLC, 2001. Available from www.setco.org.

Larsen, Amy K. "It Pays to Be Secure." Information Week, May 31, 1999.

Marlin, Steve, "SET Making Slow Progress in Banking Arena." Bank Systems & Technology, August, 1999.

Morgan, Cynthia. "Dead Set Against SET?" Computer World, March 29, 1999.

Murphy, Patricia A. "Fighting Internet Card Fraud." Credit Card Management, July, 2000.

Rolfe, Richard. "Debit Cards on the Internet." Credit Card Management, November, 1999.

Visa International. "VisaElectronic Commerce: SET." Foster City, CA: Visa International, 2000. Available from www.visa.com.

SEE ALSO: Acquiring Bank; Certificate Authority; Cryptography; Digital Certificate; Digital Signature; Digital Wallet; Electronic Payment; Encryption; Transaction Issues

Cite this article
Pick a style below, and copy the text for your bibliography.

  • MLA
  • Chicago
  • APA

"Secure Electronic Transaction (SET)." Gale Encyclopedia of E-Commerce. . Encyclopedia.com. 13 Dec. 2018 <https://www.encyclopedia.com>.

"Secure Electronic Transaction (SET)." Gale Encyclopedia of E-Commerce. . Encyclopedia.com. (December 13, 2018). https://www.encyclopedia.com/economics/encyclopedias-almanacs-transcripts-and-maps/secure-electronic-transaction-set

"Secure Electronic Transaction (SET)." Gale Encyclopedia of E-Commerce. . Retrieved December 13, 2018 from Encyclopedia.com: https://www.encyclopedia.com/economics/encyclopedias-almanacs-transcripts-and-maps/secure-electronic-transaction-set

Learn more about citation styles

Citation styles

Encyclopedia.com gives you the ability to cite reference entries and articles according to common styles from the Modern Language Association (MLA), The Chicago Manual of Style, and the American Psychological Association (APA).

Within the “Cite this article” tool, pick a style to see how all available information looks when formatted according to that style. Then, copy and paste the text into your bibliography or works cited list.

Because each style has its own formatting nuances that evolve over time and not all information is available for every reference entry or article, Encyclopedia.com cannot guarantee each citation it generates. Therefore, it’s best to use Encyclopedia.com citations as a starting point before checking the style against your school or publication’s requirements and the most-recent information available at these sites:

Modern Language Association

http://www.mla.org/style

The Chicago Manual of Style

http://www.chicagomanualofstyle.org/tools_citationguide.html

American Psychological Association

http://apastyle.apa.org/

Notes:
  • Most online reference entries and articles do not have page numbers. Therefore, that information is unavailable for most Encyclopedia.com content. However, the date of retrieval is often important. Refer to each style’s convention regarding the best way to format page numbers and retrieval dates.
  • In addition to the MLA, Chicago, and APA styles, your school, university, publication, or institution may have its own requirements for citations. Therefore, be sure to refer to those guidelines when editing your bibliography or works cited list.