Professional Documents
Culture Documents
B. Tech-III Year
(R18 Regulation)
Document By:-
M.ABHINAYA-19841A0582
V.TEJASWI-19841A0599
P.RAJITHA-19841A0591
S.NIKITHA-19841A0595
T.RAMYA-19841A05A0
1.2 SCOPE:
Automatically connects to your financial network or credit card authorization and
settlements.
Time saving processing, rather than any manual work.
Easy access to the data.
Integrates with Sales Order, Accounts Receivable, e-Business Management.
1.3 DEFINITIONS, ACRONYMS AND ABBREVIATIONS:
User: One who uses the Credit card.
HTML: Hyper Text Markup Language, used to create web pages at different stages.
POS: Point Of Sale which includes a card reader to process debit/credit card
payments.
TCP/IP: Transmission Control Protocol/Internet Protocol is the communication
protocol used to connect hosts on internet.
1.4 REFERENCES:
IEEE Software Requirement Specification format.
1.5 OVERVIEW:
SRS includes two sections –overall description and specific requirements.
Overall Description: Describes major role of the system components and inter-
connections.
Specific Requirements: Describes role and functions of the Actors- “BANKER, CUSTOMER,
RETAILER”, etc.
EXISTING SYSTEM: As per the present system, the customer needs to visit the bank for
acquiring bank details which is troublesome.
PROPOSED SYSTEM: The proposed system is aimed at easing the process-that would be
effective in using and accessing every detail of bank easily.
2) OVERALL DESCRIPTION
2.1 PRODUCT PERSPECTIVE:
This solution involves signing up for a free Business Account. Once this is done and the e-
commerce site is properly configured, you can accept payments from Visa, MasterCard,
Amex, and Discover cards payments.
2.2 PRODUCT FUNCTIONS:
1. Accept credit card numbers on the web, store them in a database, then process them
offline
2) Authorization Service -
Validate the credit card payments to ensure that the card number is valid and the
card has not expired
Deposit processing to apply the deposit payment to the card
Prepare Credit card transaction reports that show authorization codes, amounts,
and error/success messages.
2.4 CONSTRAINTS:
Trusted if using a well-known third-party processor
Must suite for higher-volume sites
Cheaper transaction rates
Getting money transferred may be very fast
Must provide fraud prevention measures and fraud protection programs
4) SYSTEM FEATURES:
1. Security:
When hackers steal personal information, suspicion isn't limited to credit card processors.
Customers often become skeptical of retailers themselves.
Today, most reputable credit card processors use a security feature called
tokenization. This process uses point-to-point encryption to conceal identifying
information.
Every customer has their own preferred payment method. Your credit card processor
should accept a wide range of payment options.
. Your credit card processor should accept these options, along with standards like
Visa.
By accepting a wide range of payment options, your credit card processor can help
keep things simple for customers.
5) UML DIAGRAMS
5.1 USE CASE DIAGRAM:
Credit card processing system use cases are:
1. Creating Account: Used to create an account.
2. Credit card request: Used to send the request to credit card.
3. Bank Enquiry: Used to get the bank enquiry like pin code to verify your user
account.
4. Issuing card: Used for issuing the card to machine.
5. Purchase the item: Used to list out the purchase details in shop.
6. Prepare the bill: Used to issuing the bill for the purchased item.
7. Paying bill: Used to transaction of money to paying the bill.
ACTORS INVOLVED:-
USE-CASE NAMES:
PURCHASE PRODUCT: Customer purchases items from ecommerce site then
proceeds to the site’s secure checkout area. .
AUTHORIZATION REQUEST: Credit card processor collects billing information
from the customer via a secure connection.
PAYMENT APPROVAL: The transaction details are recorded by the credit card
processor and results are securely relayed to the merchant. Merchant’s site receives
transaction result and does appropriate actions (e.g. saves the order & shows message).
The Credit Card Processing system class diagram consists of three classes. They are:-
1. Banker
2. Customer
3. Retailer
Choice, iteration, and concurrency are all supported through actions. Unified
Modeling is a term that refers to a method of modelling that is
Activity diagrams can be used to describe the business and operational processes in
a step-by-step manner.
Component workflows in a system An activity diagram depicts the total control
flow.
An activity is represented by a circular box with the operation's name.
The system's behaviour is depicted in this activity diagram.
Fig.3: Activity Diagram
It shows how data enters and leaves the system, what changes the information, and where
data is stored.
The objective of a DFD is to show the scope and boundaries of a system as a whole. It may
be used as a communication tool between a system analyst and any person who plays a
part in the order that acts as a starting point for redesigning a system. The DFD is also
called as a data flow graph or bubble chart.
Fig.4 (a): Zero-Level DFD
6) TEST CASES
Credit card processing test cases:-
Check the valid card number, month and year;
3-digit CVV pin is valid or not.
If any card details fail, it should throw an error message.