system interfaces
DESCRIPTION
Asper School of Business University of Manitoba. Systems Analysis & Design. Instructor: Bob Travica. System interfaces. Updated: November 2013. Outline. System interface concept Electronic Data Interchange eXtensible Markup Language Rules for system inputs Rules for system outputs. - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/1.jpg)
Asper School of Business University of Manitoba
Systems Analysis & Design
Instructor: Bob Travica
System interfacesUpdated: November 2017
![Page 2: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/2.jpg)
Outline System interface concept Electronic Data Interchange eXtensible Markup Language Rules for system inputs Rules for system outputs
2 of 13
![Page 3: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/3.jpg)
System interface concept 1) Interface with no or minimal participation
of users AND 2) Destination is another system, not user
(System-to-system link; Inputs & outputs exchanged b/w systems).*
Examples: Inputs from other systems & external
databases Automated inputs (e.g., bar code reader) Outputs to other systems & external
databases• Note: In contrast to book, reports are part of user interface (see slides for the previous class). 3 of 13
![Page 4: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/4.jpg)
Technologies for system interfaces- From EDI to Internet of Things Electronic data interchange (EDI)
input/output files (More...) Automatically formatted text files that
represent business documents Since 1960s Auto industry big user Can link to electronic funds transfer (EFT) Both sender and receiver must use same EDI
system. Was complex, expensive; cheaper Internet-based solutions today.
4 of 13
![Page 5: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/5.jpg)
eXtensible Markup Language eXtensible Markup Language (XML) input/output
files Text files with embedded markup that
describes content Since late 1990s Sender and receiver share definition of
content (Data Type Definition) Simple, cheap Security issues
5 of 13
![Page 6: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/6.jpg)
XML example
6 of 13
![Page 7: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/7.jpg)
Internet of Things (IoT) An expandable network of devices connected
via the Internet to support remote control, automation, and new services at work, home, and in settlements.
7 of 13
![Page 8: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/8.jpg)
Identifying system interfaces
• System Sequence Diagram can indicate system interfaces
8 of 13
![Page 9: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/9.jpg)
Rules for system inputs 1. Must come from a trusted source 2. Be secure (encryption) 3. Be validated for accuracy (values’ range,
data type, completeness, algorithms) 4. Capture data close to the source 5. Use automatic entry and
eliminate/minimize human involvement (electronic input rather than manual reentering of data; e.g., bar code scanning, radio frequency identification)
9 of 13
![Page 10: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/10.jpg)
Rules for system outputs System output must go to a right address and
be secure (encryption)
10 of 13
![Page 11: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/11.jpg)
Encryption and decryption
Single-key encryption/decryption
Key sharing complicated with many trading partners and in B2C e-commerce
11 of 13
“Person” = An actor, technology including
![Page 12: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/12.jpg)
Encryption and decryption
Sender (Client) can generate a private shared key for the session, encrypt it by Server’s public key, and send it to Server.
Receiver (Server) can send Digital Certification issued by Certifying Authority and encrypted by CA’s private key, to get authenticated by Client. Client's browser usually has CA’s public key built in and thus decrypts the certificate.
Double-key encryption/decryption
12 of 13
![Page 13: System interfaces](https://reader036.vdocuments.mx/reader036/viewer/2022062411/56816843550346895dde17a1/html5/thumbnails/13.jpg)
3510 Systems Analysis & Design * Bob Travica
Encryption and decryption
Double-key encryption/decryption
4. Client sends its public key to the Server. Connection is secured from that point on as both will encrypt messages with public keys.
2. Receiver (Server) sends Digital Certification issued by Certifying Authority (CA) and encrypted by CA’s private key, to get authenticated by Client.
Possible secure communication process: 1. Sender (Client) requests Receiver’s (Server) authentication and secure connection.
3. Client's browser decrypts message using CA’s public key built into Client's browser.
Or: Either side generates a private key for the session, encrypts it by the other side’s public key, & sends it over. Connection is secured as in single private key encryption model.
13 of 13