Browse Definitions :
Definition

Internet Open Trading Protocol (IOTP)

Internet Open Trading Protocol (IOTP) is a set of standards that makes all electronic purchase transactions consistent for customers, merchants, and other involved parties, regardless of payment system. IOTP accommodates a wide range of payment systems such as Secure Electronic Transaction, digital cash, e-checks, and debit cards. Payment system data is encapsulated within IOTP messages. IOTP is designed to handle a transaction that involves a number of different parties: the customer, merchant, credit checker and certifier, bank, and delivery handler. IOTP uses the Extensible Markup Language (XML) to define data that encompasses everything that may be needed in a transaction.

In the "real world," you can negotiate certain factors when considering a purchase. These include choosing who you conduct business with, whether it will be conducted in person or by phone, the method of payment, the provision of a payment receipt, and the delivery of the product. In the virtual world, IOTP is designed to ensure that all of these factors are successfully and securely performed.

Companies contributing to the development of IOTP include Hewlett Packard, IBM, JCP, MasterCard International, Smart Card Integrations, Sun Microsystems, and Wells Fargo Bank.

This was last updated in September 2005

SearchCompliance

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity

  • principle of least privilege (POLP)

    The principle of least privilege (POLP) is a concept in computer security that limits users' access rights to only what are ...

  • biometric authentication

    Biometric authentication is a security process that relies on the unique biological characteristics of individuals to verify they...

  • denial-of-service attack

    A denial-of-service (DoS) attack is a security event that occurs when an attacker makes it impossible for legitimate users to ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close