ECheck Security: E Check Security is a combination of the latest technology with established business practices that prevent fraud on e-checks. E check is subject to strict banking and government business standards and practices to ensure system security. In addition, e-check prevents system security from being compromised by the combination of technology tools, encryption of data, digital signatures, certificates, secure email and smart card technology.
Electronic Checkbook: The electronic checkbook is hardware in the form of an electronic markbook that fulfills the functions of the e-checkbook, encryption tools, open and private key pairs, certificates, tools for opening locked software and other functions. In the US Treasury market, the electronic checkbook is included in the smart card and includes clear and private key pairs, encryption tools and certifications for the creditor. It also contains the instructions that the creditor can initiate the software and keep the transaction log log securely.
Electronic Deposit Slip: This is the electronic version of the paper tray. It is in the electronic checkbook of the creditor. The creditor inserts the electronic receipts into the e-tick and e-mails to the bank at two.
E-Check Verification: The step of confirming the e-check. In the US Treasury market, the accuracy of each e-check received by the creditor was automatically provided by the creditor software (using digital signatures and certificates).
When the e-check is deposited, the bank implements additional verification procedures on its own databases. E-mail (E-mail): In the US Treasury market, e-mail, e-checks have been sent, received and paid. To send and receive e-checks, the creditor must have an internet mail address.
SET Secure Electronic Transaction: Secure Electronic Transaction – SET is a specification for making secure credit card transactions over the internet used in combination with encryption, digital signatures, certificates and third party approvals very secure. E-Check uses the same techniques as SET to secure electronic check payments, but unlike online credit card transactions, a different approach is used to support the quality of offline / offline check payments.
Firewall: A combination of software and hardware that separate the company’s computer network from external networks, especially from the Internet. The company’s computers are limited by the types of connections and data exchanges between the computers on the external networks and the company’s own computers, the firewall that protects the internal network from security attacks from external networks. Firewalls monitor traffic between two networks, examining unauthorized uses and suspicious dialogs. Because firewalls typically allow sending and receiving e-mails over the Internet (checking their contents as much as possible), e-checks can be received by the security wall of e-checks credited via e-mail.
Duplicate Detection: Duplicate Detection is the period in which the bank identifies the duplicate checks sent to the bank for deposit. In the US Treasury market, the copying agent helped the bank confirm the appropriate deposits recorded only on the account of the creditor. The FED also conducts a copy control to ensure that the treasury check is not paid twice, even if two different banknotes are deposited.