Page 93 - E-Commerce
P. 93
92
In 2007, the OFTP2 protocol was developed specifically to be used over the internet.
This update included important improvements over OFTP such as improved data
security (via exchange of digital certificates) and the capacity for high compression.
In addition to allowing for very secure exchange of high volumes of data via dedicated
servers, OFTP2 is remarkably simple to use compared to other protocols, with only 14
commands.
Crucially, unlike with AS2, with OFTP it is possible to push and pull information
(rather than just pushing). It also gives the user the ability to request signed receipts,
further improving data security.
For temporary issues, OFTP2 offers transmission restarts. This is preferable to the
alternative method of causing an error and aborting the session, which in turn requires
the message to be resent in a following session.
OFTP2 is widely used in the automotive industry in Europe, though is also popular
across retail, manufacturing, banking and government industries among others.
Advantages of OFTP2
Simple to use
Allows for high-volume data exchange (up to 9 Petabytes)
Ability to push and pull messages
Highly secure
Automatic file restart
Widespread adoption throughout process and automotive industries
Disadvantages of OFTP2
Requires integration of separate application
Requires specific knowledge
Requires all participants to have the capability, which limits its adoption.
Requires registration with the ODETTE organisation to receive accredited
Odette ID
REST API
An API, or Application Programme Interface, is a combination of rules and
mechanisms which dictates how two endpoints are able to interact and share
information.
In theory data exchange via APIs offers a great advantage to businesses as it allows
for free access to important B2B data without the need for participation of the partner
or availability in the moment of transmission. Once an API has been set up, data can
be accessed instantly and whenever convenient. Companies are also able to ensure a
high level of security by the ability to restrict access as required.