Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
PROJECT REPORT ON
SUBMITTED TO:
BY
SUBMITTED
ANAND KUMAR
MBA 2
SEMESTER
SECTION A
ACKNOWLEDGEMENT
Behind every study there stands a myriad of people whose help and
contribution make it successful. Since such a list will be prohibitively long, We
may be excused for important omissions.
We would like to express my heart-felt gratitude to our
respected DR.SYED
We would also like to record our sincere gratitude to all those who have
helped us directly or indirectly in the fulfillment of this study.
TABLE OF CONTENTS
Chapter-1
pageno#
INTRODUCTION....................................................................6
1.1
1.2
1.3
About Paytm..6
Achievements.....8
Technical Architecture Of Paytm...9
Chapter-2
WORKING AND TECHNOLOGIES OF PAYTM.............10
2.1 Supply Chain Management Of Paytm10
3
Chapter- 3
REVENUE MODEL OF PAYTM..................15
3.1
3.2
3.3
3.4
3.5
Chapter- 4
E-COMMERCE SECURITY AND PAYTTM.....................30
4.1
4.2
4.3
4.4
4.5
4.6
4.7
Chapter- 5
ELECTRONIC PAYMENT SYSTEM......50
5.1
Chapter- 6
BIBLIOGRAPHY....................................................................57
CHAPTER-1
INTRODUCTION
Paytm means Pay through Mobile. It is one of the largest is one of the fastest growing
Indian e-commerce shopping websites launched in 2010. The name of the company who
launched the Paytm is One97 communication. Initially it is focused on Mobile and DTH
recharging. The Company headquartered in Noida, India. It gradually provided recharging and
bill payment of various portals including electricity bills, gas bills as well as telephone bills.
In 2014 Paytm has started the business same like as the facilities are getting from the other ECommerce company such as Flipkart, Amazon, and Snapdeal. Today, it is India's most popular
online destination for prepaid mobile & DTH recharges and shopping, and its Android and iOS
apps have been ranked among the most popular apps. In only 3 years since the founding, the
company created a user base of 25 million wallet users and 10 million app downloads.
SERVICE:
In 2014, the company launched Paytm Wallet, India's largest mobile payment
service platform with over 40 million wallets. The service became the preferred mode of
payment across leading consumer internet companies such as Uber, Bookmyshow, Makemytrip.
FUNDING:
Paytm
got
major
boost
in
e-commerce
when
Indian
industrialist RatanTata made personal investment in the firm in March 2015.In the same month,
the
company
received
$575
million
investment
from
Chinese
e-commerce
company AlibabaGroup, after Ant Financial Services Group, an Alibaba Group affiliate, took
25% stake in One97 as part of a strategic agreement.
PARTNER: Paytm works with all mobile operators in all states in India for prepaid mobile,
DTH and Data card recharges and postpaid mobile, landline and Data card bill payments. Its
partners with the multiple national banks, for credit card, debit card and net banking payments.
Pay tm also works with various billers for utility bill payments.
Fig 1#: Screen shot introduction to paytm
1.2 ACHIVEMENTS:
2014 Paytm is Gold Winner at the MMA Smarties in the
Mobile App category.
2014 Paytm is Silver Winner at the MMA Smarties in the
mCommerce category
2014 Paytm wins the Best Mobile Money product at the
4th India Digital Awards.
2013 Paytm wins Knowledge Faber Best Mobile Wallet
Program Award.
2013 Paytm wins a special mention in m Billionth
Awards in mCommerce/mBusiness category.
2013 Paytm is Gold Winner at the MMA Smarties for ECommerce.
2012 Paytm is recognized as the Most Innovative Startup
of the Year at the Entrepreneur India event organized by
Franchise India.
1.3 TECHNICAL ARCHITECTURE OF PAYTM:
7
CHAPTER-2
WORKING AND TECHNOLOGIES OF PAYTM
JAVASCRIPT
JAVASCRIPT
MARKUP LANGUAGE
HTML
CHARACTER ENCODING
UTF-8: UTF-8 (8-bit Unicode Transformation Format) is a variable-length character
encoding for Unicode, which is backwards compatible with ASCII.
EXTERNAL CSS
External Cascading Style Sheets define style rules in a separate CSS file.
EMBEDDED CSS
Embedded Cascading Style Sheets define a set of style rules in a <style> element within a
web page.
INLINE CSS
Inline Cascading Style Sheets define style rules directly within an (X)HTML element
using the style attribute.
SESSION COOKIES
Session cookies are temporary cookies, which are deleted when the user closes the
browser.
EXTERNAL CSS
10
External Cascading Style Sheets define style rules in a separate CSS file.
EMBEDDED CSS
Embedded Cascading Style Sheets define a set of style rules in a <style> element within a
web page.
INLINE CSS
Inline Cascading Style Sheets define style rules directly within an (X)HTML element
using the style attribute.
SESSION COOKIES
Session cookies are temporary cookies, which are deleted when the user closes the
browser
HTTPONLY COOKIES
Http Only cookies are used only in the HTTP protocol and not in client side scripts,
which may increase security.
NON-HTTPONLY COOKIES
Non-Http Only cookies are used in the HTTP protocol and also in client side scripts,
which may be a security threat.
SECURE COOKIES
Secure cookies are used only via an encrypted connections, which may increase security.
HTTP Strict Transport Security (HSTS) defines a mechanism enabling web sites to
declare themselves
WEB SERVER
NGINX - Nginx (pronounced as "engine X") is a lightweight open source web server.
The two main ingredients in a Web server are its hardware and software.
Operating system of the network. UNIX operating system is found to be more rugged
than that of Windows, but UNIX is more complex to manage than Windows.
Hardware requirement of the Web server software. A PC with a midrange CPU, small
hard drive, and 32 megabytes of memory will perform poorly when compared with a
high-end workstation or a powerful UNIX-based computer.
12
Expected traffic or the number of transaction per unit time. Running a large, enterpriseclass application server (such as an ERP system) on a personal computer is not feasible.
Other software running on the same computer. For example, running a Web server and a
database server can significantly slow down the performance of a computer.
Scalability of the hardware -- meaning upgrade of components such memory, disk space,
disk mirroring, or even connect additional Web servers if necessary.
Core capabilities
13
Site management
Application Construction, and
Electronic commerce
CORE CAPABILITIES:
SITE MANAGEMENT:
A Web server provides tools to manage multiple Web sites, file security, virtual file, and
APPLICATION DEVELOPMENT:
Application development includes Web editors and extensions to produce Web pages either
static or dynamic. These include HTML editors such as FrontPage for static Web pages. For
dynamic Web pages, there are protocols such as Common Gateway Interface (CGI) and
Application programming Interface (API) that are used by programs such as Java and C++ to
develop dynamic Web pages.
ELECTRONIC COMMERCE:
Some Web servers provide advanced services that support online selling and buying (such as
shopping cart and catalog services). An electronic commerce software can provide templates
and other tools to quickly develop an e-commerce site. This might include templates for product
browsing, shopping carts, and credit card processing.
14
CHAPTER-3
REVENUE MODEL OF PAYTM
Paytm earn their revenue through the market place model. They work on market place model and
they belive in the market place model for their revenue, they give to opportunity to vendors to
sell or listed their products on paytm webside, so the buyer are comes and buy the products. In
this activity paytm charge commission from the seller so this is a some part how they generate
their revenue. They do also some more activity to generate their revenue.
Paytm knows that Revenue model is framework of revenue.it is a description How a business
generate income, profit,or an average earning in a business.and they fully concentration their
revenue model.
Thats belive also purely marketing strategy, they get earnings from sponsored advertisers, showing
ads, they give coupons (from sponsors), so inorder to gain some popularity and to bare the
competition they are giving the cashback. So they attract more visitors as well as get more
sponsors, ultimately making them profitable. its a most profitable strategy of paytm.
15
Fig#4 : Screen shot of paytm market place : they give the opportunity to sell their product on
paytm web site.
16
Fig 5#
After completion this process paytm offer to merchants choose the subscription
plan this is the way paytm earn the revenue from the merchants.through the
subscription model. This is the part of subscription model of paytm.
17
18
Fig 6# : This is the activity the paytm earn revenue from the seller as a commission when seller
products are sold in this site. This is the best strategy for paytm to earn their revenue part.
Silver plan
Gold plan
Platinum plan
Budget (zero setup plan)
This plan have own their benefits ,highest plan is platinum plan give more benefits to
seller to sell their product in site. In other hand silver plan give less benefits as
comparative to platinum or gold plan. This all the plan are charge by the seller one time
in the annually
19
Fig 7#
The paytm charge also additional charges through the seller like: annual maintenance
charge (AMD) that is 2500 annually, and 12.38% charges if its applicable. Its a part of
paytm subscription model to generate their revenue. In this strategy paytm give the more
opportunity(plan) to its merchant and give the diffrent benefits to the seller .
avail the facility paytm wallet which is provided by paytm. The famous merchants in the
paytm are: dominos, jabong.com, book my show, ebay, uber, and haldiram.
Fig 8#
21
Fig 9#
22
23
Fig 10# : Its a screen shot shows how yippee noodles show their advertisment on paytm site
subscription revenue model to generate the revenue in their business.this is the most beneficial
model as comparative to others model to generate the revenue.
If you loading your money into the wallet, paytm charges nothing amount in this transeaction,
If you purchase any product at merchant site the paytm also charge nothingin this transeaction.
If you transfer the money into one wallet to other person wallet, on this transaction paytm also
not charge any amount. but if you transfer the money from paytm wallet to bank paytm
charge 4% of the amount that you are transfer into bank . this is the transeaction revenue
model of paytm .
25
3.4.6 They Are Some Other Activity The Paytm Earn The Revenue:
Paytm escrow: through escrow account paytm received intrest,when buyer payment
to their purchase that amount hold by paytm untill customer not confirm it.if customer
26
not confirm in next 7 days paytm expect buyer satisfied with the product and they
transfer the money seller account.
Patym charges annual subscription fees to the sellers who list their products on website
Introducing Paytm Wallet, a secure digital wallet where you can store money and use it
to make quick recharges, pay bills, do shopping on Paytm. You can also send money to
friends & pay for various services like Uber, MakeMyTrip, BookMyShow & many more.
Chat Facility:
Paytm provide chat facility to their buyer so they can bargain the product price from the
seller..through very easy steps they can avail the facilty of paytam chat facility. This screen
shot define how a customer bargain to the seller:
27
Fig 11#
Mobile Friendly:
paytm service is also available in mobile so you can easily download and use this application
in your mobile anywhere. On other hand we can say that its a mobile friendly application.
They are available on many store:
28
Fig 12#
Fig 13# This are the application/ software paytm use for their security purpose
They provide 45+ banks for net banking.(one of the largest Payment Gateways in India.)
You canalso Rs 1 lakh plus money transfer (follow the KYC(know your customer ) rule
and regulation) otherwise its RS 10000 .
29
Fig 14# : A consumer can also sell or do business with the help of paytm
Fig 15#
CHAPTER-4
E-COMMERCE SECURITY & PAYTM
30
the fact
Authenticity: authentication of data source
Confidentiality: protection against unauthorized data disclosure
Privacy: provision of data control and disclosure
Availability: prevention against data delays or removal
31
permission, e.g., music downloading, domain name (cyber squatting), software pirating.
Trojan horse : Appears benign, but does something other than expected.
Bots: Covertly installed on computer; respond to external commands sent by attacker to
create a network of compromised computers for sending spam, generating a DDoS
Denial-of-service (DOS) Attack : Hackers flood Web site with useless traffic to
inundate and overwhelm network. Use of bot networks built from hundreds of
compromised workstations.
Fig 16#
Server Threats:
Hacking : Hackers are those Individual who intends to gain unauthorized
access to computer systems. Where as Crackers are those Hacker with criminal intent. Types of
hackers:
33
White hats hired by corporate to find weaknesses in the firms computer system
Black hats hackers with intention of causing harm
Grey hats hackers breaking in and revealing system flaws without disrupting site or attempting to profit
from their finds.
Credit Card Fraud: Fear of stolen credit card information deters online
purchases.
USs federal law limits liability of individuals to $50 for a stolen credit card.
Hackers target credit card files and other customer information files on
merchant servers; use stolen data to establish credit under false identity.
Online companies at higher risk than offline due to difficulty of
guarenteeing true identity of customers.
E-Sign law giving digital signatures same authority as hand-written ones
applies only to large corporations, but not to B2C e-commerce.
Spoofing (Pharming) : Misrepresenting oneself by using fake e-mail addresses or
masquerading as someone else . Spoofing a Web site is called pharming, redirecting a Web
link to another IP address different from the real one. Threatens integrity (steal business from true
site, or alter orders and send to true site), and authenticity (difficult to
distinguish between true and fake Web address) Carried out by hacking local DNS servers
.
Spam (Junk) Web Sites : Collection of advertisements for other sites, some of which
containing malicious code. Appears on search results, hiding their identities by using
domain names similar to legitimate ones, and redirecting traffic to spammer domains.
34
35
Fig 17#
The security infrastructure is the implementation of the security policy. The security
infrastructure is the technology which is chosen to secure the e-business and the rules by
Still missing a way to verify identity of Web sites. We can do this by using
digital document issued by a trusted third party called certificate authority
(CA).
Digital Certificate Includes:
Name of subject/company
Subjects public key
Digital certificate serial number
Expiration date, issuance date
Digital signature of CA
Fig 18#
Browser Protection :
Browser security is the application of Internet security to web browsers in order
to protect networked data and computer systems from breaches of privacy
or malware. Security exploits of browsers often use JavaScript - sometimes
with cross-site scripting (XSS)] - sometimes with a secondary payload
37
Anti-virus software:
It is the Easiest and least expensive way to prevent threats to system integrity.
38
Fig 19#
Fig 20#
40
41
42
Digital Signature :
Digital signature refers to the igitized images of paper signature used to verify the
authenticity of electronic document. In other words, digital signatures play the role of
physical signatures in verifying electronic documents. A signature is not part of the
substance of a transaction, but is a representation.
Fig 21#
It is a mathematical technique used to validate the authenticity and integrity of a message,
software or digital document.
Firewall
It is a network security system that controls the incoming and outgoing network traffic
based on an applied rule set. A firewall establishes a barrier between a trusted, secure
internal network and another network (e.g., the Internet) that is assumed not to be secure
and trusted. Firewalls exist both as software to run on general purpose hardware and as a
43
hardware appliance. Many hardware-based firewalls also offer other functionality to the
internal network they protect, such as acting as a DHCP server for that network.
Fig 22#
44
Fig 23#
45
range of choices. Customer would prefer the one who would provide goods at reasonable
price, deliver it fast and provide them with other benefits like COD, EMI facilities, others
offers etc. here buyers have more power.
Substitute for this industry as of now is physical stores. Their threat is very low
for this industry because customers are going for online purchases instead of
going to physical stores as it will saves time, effort, and money. With the advent
and penetration of internet and smartphones, future in retail belongs to online
retail.
When we compare relative quality, relative price of product a person buys online
with physical stores, both are almost same and in some cases, online retail stores
offers mores discounts and this attracts the customer to purchase products online.
There are very less barriers to entry like less capital required to start a
business, less amount of infrastructure required to start business. All you need
is to tie up with suppliers or products and you need to develop a website to
display products so that customers can order products, and a tie up with online
With the new entrants like Jabong, Snapdeal, Flipkart, Shopclues etc rapidly racing
towards the top position, Paytm needs to devise new strategies to avoid this threat from new
entrants.
48
Security-Related Procedure:
Procedures address such topics as connecting to the site's system from home or while
traveling, retrieving programs from the network, using encryption, authentication for
issuing accounts, configuration, and monitoring.
Security Practices:
49
Implement a one-time password system. Ensure that all accounts have a password and
these passwords are difficult to guess.
Use strong cryptographic techniques to ensure the integrity of system software on a
regular basis.
Keep the systems current with upgrades and patches.
Audit systems and networks, and regularly check logs for detecting an intrusion.
4.6.2
HOW TO
MINIMIZE SECURITY THREATS:
50
51
Fig 25# : The whole security goes within for e-commerce site like to paytm
CHAPTER-5
52
Fig 26#
53
INTERNET BANKING:
Banking thorugh bank official websites. User ID & Passward is must with
register mobile number for OTP.
DEBIT/CREDIT CARDS :
Online transaction on PAYTM is secure with the highest levels of
transaction security currently available on the Internet. PAYTM uses 256-bit
encryption technology to protect your card information while securely
transmitting it to the respective banks for payment processing.
E-VOUCHERS(eGV):
The e-Gift Vouchers (EGV) can be redeemed online against Sellers listed on
www.PAYTM.com only. EGVs can be redeemed by selecting the payment
mode as e-Gift Voucher.
54
What is OTP?
OTP is one-time password issued by bank to customer for payment
transaction through IMPS.
Quick processing: Cash cards function similar to an ATM machine that can
transact money with a single swipe on the machine.
Added discounts: Many brands tie up with cash card companies to come
up with exclusive limited offers on products. These apply to only cash card
users and no one else.
Convenient and hassle free gift option: A corporate cash card can be
used as a gifting option for employees during gifting occasions. ItzGift cards
from ItzCash carry the flag for a cashless gift card.
55
56
Fig 27#
58
Fig 28#
Fig 29#
Recharge is done.
CHAPTER-6
BIBLIOGRAPHY
WWW.WIKIPEDIA.COM
WWW.PAYTM.COM
59
WWW.SLIDESHARE.NET
PAYTM------COMPANY IN NOIDA
60