Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement"
|
|
|
- Coleen Conley
- 10 years ago
- Views:
Transcription
1 !!!! Stronger(Security(and( Mobile'Payments'! Dramatically*Faster!and$ Cheaper'to'Implement" Here$is$a$simple,$cost$effective$way$to$achieve$transaction$security$for$ mobile$payments$that$allows$easy$and$secure$provisioning$of$cards.$ Most$importantly,$it$is$compatible$with$existing$retail$POS$systems$ and$does$not$require$retailers$to$make$software$or$hardware$ changes.$ A LoopPay White Paper by George Wallner 2014 LoopPay, Inc. All rights reserved
2 F raud protection has always been a compromise: how much protection and at what cost? Many good solutions are never adopted because they either require too many changes or cost too much. Mobile Tokenization described in this paper adds substantial security at minimum cost because it does not require new equipment or software at the point of sale. Magnetic stripe cards carry static data that can be easily copied and used time and again until their limit is reached or fraud is detected and the card cancelled. Smart cards (such as EMV) contain a microchip that can "sign" transactions with cryptographically generated dynamic data based on a secret key stored in the card. Because the signature is cryptographically generated and is dynamic, smart cards are very effective against copy or replay fraud. The smart card concept has been adapted to contactless cards and mobile phones using NFC. The phones or UICC (SIM cards) are equipped with a Secure Element (SE), which is essentially a chip that can sign transactions in a similar fashion to a smart card. This document describes a practical tokenization scheme that adds security to mobile transactions while remaining fully compatible with existing POS terminals and retailer systems. Mobile Tokenization is intended for card issuers who are looking for a flexible and easy method to add security to magnetic stripe cards as they move from the physical cards onto Loop's mobile LoopWallet and other virtual environments. Security is always a compromise between protection and cost. A practical security system that gets adopted is better than a perfect one that stays on paper. Accordingly, Mobile Tokenization maintains compatibility with the existing retailer and acquirer infrastructure while providing good security at low cost. While it is relatively easy to make and securely provision smart cards, mobile phones are much harder to securely provision and manage. That s because the card issuer cannot control them at any point in their lifecycle and also because the phones must support multiple cards belonging to different networks. Furthermore, the system requires a complex chain of "trusted" entities, hardware in phones, and a slow multi-step card provisioning process all of Figure 1: NFC Mobile Payments. The credentials and keys are provisioned into the SE of the smartphone. Once provisioned, the SE can sign any number of transactions (within some risk profile). The card issuer trusts the SE and accepts transactions and credentials signed by the SE. Achieving Mobile Payment Security Minus the Upgrade Costs 2
3 which make widespread mobile payment adoption costly, complex and painful. If a card issuers wants to add another factor of authentication for more security, today the entire system would have to change from: NFC chip, to NFC certified POS terminal, to Acquirer back to the issuer. Tokenization s Advantages and Constraints Rather than empower the hardware (chip or phone) to sign transactions, tokenization is an alternative security technology that converts the traditional card data, including the Primary Account Number (PAN), into a token. The token is just a number, whose only function is to point to the original card data, which is stored in a secure host called the "Token Vault." Protecting the PAN is one goal of tokenization. But unfortunately the PAN has become more than just an account identifier. Retailers, acquirers and cardholders all use the PAN for a variety of functions. The first six digits, (IIN or BIN) are used for routing. Some acquirers also use the first nine digits for routing. And the PAN is often used for refunds and dispute resolution. In addition, some retailers use the PAN to recognize frequent shoppers. Consumers use the PAN, or at least the part printed on receipts, to reconcile accounts (especially expense accounts). Figure 2: The Token Cycle In its classical form, tokenization obscures the entire PAN. Recent variations only tokenize part of the PAN, leaving the first six digits readable. They also rely on issuing new unique-bin (IIN) PAN-s, so there is no chance that the randomized PAN coincides with an existing PAN. To be able to support all of this requires that retailers modify their systems to use the token instead of the card number (PAN) for various functions, including loyalty. But tokens change, which raises a number of issues. How, for example, would retailers match tokens with customers? Would the retailer have to refer to an outside organization that maintains the Token Vault to match a token with an account? Each time they see a token? What about consumers trying to reconcile receipts with statements? The alternative is to leave the PAN un-obscured and only tokenize the rest of card data. Although this leaves some exposure, it ensures compatibility with existing retailer systems, acquirers and consumer behavior, while still adding substantial security. By not forcing retailers to change, a key barrier to adoption is eliminated. Achieving Mobile Payment Security Minus the Upgrade Costs 3
4 Loop's Mobile Tokenization Rather than empowering the phone (or its built-in Secure Element chip) to sign transactions, Mobile Tokenization relies on a central host to tokenize and distribute tokenized card data. This is possible because, unlike a smart card, a mobile phone is almost always connected to a communications network, which is the crucial game-changer that allows practical tokenization for these devices. Compatibility with existing retail systems, meanwhile, is achieved by leaving the PAN (either fully or partially) readable. The Expiry and Service Code fields also remain readable. The rest of the card data, the Other Data and Discretionary Data fields, are replaced with a one-time token. One-time mobile tokens can also be created by a secure microprocessor on various Loop enabled devices, like a dynamic CVV. The keys to create these one-time tokens can be sent to Loop devices via a central host provisioning and authentication server, hosted by the card issuer, or card processor/network. Just prior to transmission, the one-time token is created using the key plus sequence number, and even time stamped. Other authentication factors, from PIN to biometric, to location verification, can be added by the issuer without requiring merchant change. When the one-time token bundled with the track data is transmitted by the POS terminal via Loop s Magnetic Transmission, the package is delivered back to the issuer based on the PAN data, the issuer can then checks the PAN to see that it is a mobile tokenized card, if so, the issuer performs an authentication check on the one-time token, along with the other checks the issuer performs before it ultimately authorizes or declines the transaction. Loop's Magnetic Transmission The adoption of Mobile Tokenization is made practical by Loop's magnetic induction technology, which enables contactless POS transactions via existing POS terminals without requiring hardware or software changes. It can do this because it uses the ordinary magnetic stripe reader as the contactless data receiver. MST (magnetic secure transmission) formats the card data into simulated magnetic stripe tracks and transmits them via magnetic pulses, which can be read by existing terminals' magstripe reader. The contactless transfer distance is one to three inches (30 to 60 mm) and is extremely reliable. MST essentially repurposes the ordinary magstripe readers for mobile payments so that mobile phones can make contactless card payments via the existing retail infrastructure where the mobile phones use an internal MST transmitter or an external accessory. A simple analogy: A smart card is like a gun that can make its own bullets. It can sign transactions on demand through its entire lifecycle (or until cancelled). This is awesome power that requires serious security. Hard to achieve in a mobile phone. In a tokenized environment bullets are made in a secure central host (this is called Host Card Emulation). Bullets (tokenized cards) are distributed to mobile phones on an as-needed basis. As the mobile phones do not know how to make bullets, the security burden on them is greatly reduced and the system-wide exposure of the card issuers becomes much smaller. Achieving Mobile Payment Security Minus the Upgrade Costs 4
5 And because the track data is simulated it doesn t have to be the original magstripe data; it can be dynamic tokenized card data. This offers an opportunity to replace magnetic stripe transactions with secure mobile transactions all without the disruptive delays and the significant costs of retail system upgrades. How Mobile Tokenization of Card Data Works As stated earlier, retailers and acquirers need the Primary Account Number (PAN). Therefore Mobile Tokenization tokenizes only part of the card data, leaving the PAN, Expiry Date and the Service Code (SVC) readable. These are data fields that retailers and acquirers use. The rest of the card data, the Other Data and the Discretionary data, are tokenized. Figure 3: Typical Track 2 Data The tokenized part of the card data that replaces the Other Data and Discretionary Data fields is called the Token Part. It consists of two data elements: the Token Part Value (TPV) and the Token Mode Indicator (TMI). Figure 4: Tokenized Track 2 Card Data. The token replaces the data following the Service Code (SVC). The token consists of two parts: the Token Part Value and the Token Mode Indicator. Because the Token Part Value is created through a cryptographic process whose key is secret, and because it includes dynamic data that changes with every new token, an attacker cannot predict what the next valid token should be. And because a token is valid for only one transaction, used tokens cannot be reused for fraud. Tokens are generated in a secure host environment and are encrypted and distributed to the mobile phones over the air. The Token Mode Indicator allows card issuers to identify tokenized cards, validate them and manage the tokens' lifecycles. Creating the TPV The Token Part Value is a cryptographically generated one-time token that is derived from the following data elements: 1. Card data elements: PAN, Expiry, SVC 2. Token Sequence Number 3. HASH, obtained from the Discretionary data and the Loop Account ID Achieving Mobile Payment Security Minus the Upgrade Costs 5
6 Figure 5: The Token Part Value The HASH includes the card's original discretionary data (which includes the CVV) to link the CVV to the token. It also includes the LoopWallet Account ID, which links the token to the users account. By linking the account and CVV together, tokens become specific to a card and an account. The key used to generate the TPV is generated at the time the card is first provisioned and it is changed regularly afterwards. The HASH is also generated at the time of provisioning the card. Both are held in the database and later used for token verification. Figure 6: Generating the Token Part Value The Token Sequence Number (TSN), which is one of the inputs to the token generation algorithm, is incremented each time a new token (TPV) is generated. Because of the new TSN value, and the encryption process that "randomizes" the output data, each new token will be very different than the previous one. The TSN therefore makes it impossible to predict the next valid token (TPV). Also, because a token is cancelled after it is used, a replay attack will also not work. It is expected that the issuer's system will change the key used to generate the TPV at least once before the TSN wraps around (i.e. reaches 9999). This means that tokens never repeat in a predictable fashion. TPV Generation Algorithm The algorithm is based on the public OATH One Time Password algorithm. The main difference versus OATH is that the inputs, which are derived from the card data and the account ID, comprise 128 bits while the extracted TPV is 8 digits. By including the HASH, the TPV algorithm incorporates into the token value the card's original discretionary data and the LoopWallet user's Account number. This process adds an additional layer of security, which ensures that a token is both invalid for a different card, but also invalid when someone attempts to use the same card from a different account using the same issuer key. An attacker would not only have to know the Is the magnetic stripe obsolete? Yes, it is obsolete for financial transactions that don t require a PIN. The problem is the card: it is static and its data can be copied. Cards with a PIN, or retailer cards with low financial value mostly cards where the cost of adding a chip is prohibitive will continue using the magnetic stripe for a long time. In any case, the problem is with the card, not the reader. The card is static. The reader can read dynamic information and therefore it is possible to have good security via the magstripe reader. It is just an interface. The card is obsolete; the reader is not. Achieving Mobile Payment Security Minus the Upgrade Costs 6
7 issuer key but also the LoopWallet user s Account Number, which is never visible outside the card issuer's authentication server due to the HASH generation process. Figure 7: The TPV Algorithm In Conclusion Mobile Tokenization is a simple technology that offers an easy and cost effective way to improve card payment security without the need for the retailer to change his system. The technology provides greater end-user convenience when enabling mobile devices for payments, liberating consumers from plastic cards while also giving merchants the data they need to orchestrate effective customer engagement. Loop s Mobile Tokenization works with today s retail payment infrastructure and will work tomorrow with future infrastructures that comply with the EMVCO Tokenization Framework standard. As this trend toward mobile payments gains momentum, retailers want two things: greater security plus a way to minimize large-scale infrastructure investment. Mobile Tokenization addresses both needs simultaneously. About George Wallner Inventor of the Modern POS Terminal George Wallner s plan to transform payments as we know it was hatched in his kitchen. The year was 1978 and he and his brother Paul, both engineers, had been tinkering with a few ideas focused on developing large telephone systems and data collection networks. The Wallner brothers recognized that merchants needed a way to expedite consumer payments at the point of sale using the magstripe cards. And the company that they formed, Hypercom, was the first ever to enable the electronic payments that are the bedrock of the modern payments industry. Achieving Mobile Payment Security Minus the Upgrade Costs 7
8 Hypercom grew into a global provider of POS terminals and support networks. George served in various roles there, including CEO, Chairman and Chief Technologist, taking the company public in In 2006, Wallner went on to invest in ROAM Data, a leading vendor of mobile card acceptance equipment and software that was later acquired by Ingenico in early His latest venture, LoopPay, really comes full circle. It has developed a practical mobile payment solution that enables smartphones to be used for card present payments at the point of sale without requiring merchants to install any new hardware or software leveraging the technology standard that powered the point of sale terminals he invented some two decades before. About Loop Loop invented the world s first mobile wallet app that allows consumers to securely store all their cards and pay with their Loop-enabled devices (accessories, smartphones, smart watches) virtually everywhere. The LoopWallet app reduces the clutter of plastic cards (payment, gift, loyalty, ID, membership cards) allowing consumers to leave their plastic behind with confidence. Based in Boston, MA, Loop s patented Magnetic Secure Transmission (MST) technology turns existing mag stripe readers into mobile contactless readers without any change or cost by the merchants or their payment processors. Loop provides not only breakthrough convenience for consumers to organize and pay with mobile devices, but also with the highest level of payment security to protect consumer card data. Loop is a Level One PCI Certified Payment Provider. To learn more and order Loop products, visit For further information: [email protected] Web: Achieving Mobile Payment Security Minus the Upgrade Costs 8
EMV FAQs. Contact us at: [email protected]. Visit us online: VancoPayments.com
EMV FAQs Contact us at: [email protected] Visit us online: VancoPayments.com What are the benefits of EMV cards to merchants and consumers? What is EMV? The acronym EMV stands for an organization formed
What Merchants Need to Know About EMV
Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the
Heartland Secure. By: Michael English. A Heartland Payment Systems White Paper 2014. Executive Director, Product Development
A Heartland Payment Systems White Paper 2014 Heartland Secure. By: Michael English Executive Director, Product Development 2014 Heartland Payment Systems. All trademarks, service marks and trade names
How Secure are Contactless Payment Systems?
SESSION ID: HT-W01 How Secure are Contactless Payment Systems? Matthew Ngu Engineering Manager RSA, The Security Division of EMC Chris Scott Senior Software Engineer RSA, The Security Division of EMC 2
Mobile Near-Field Communications (NFC) Payments
Mobile Near-Field Communications (NFC) Payments OCTOBER 2013 GENERAL INFORMATION American Express continues to develop its infrastructure and capabilities to support growing market interest in mobile payments
EMV Frequently Asked Questions for Merchants May, 2014
EMV Frequently Asked Questions for Merchants May, 2014 Copyright 2014 Vantiv All rights reserved. Disclaimer The information in this document is offered on an as is basis, without warranty of any kind,
EMV : Frequently Asked Questions for Merchants
EMV : Frequently Asked Questions for Merchants The information in this document is offered on an as is basis, without warranty of any kind, either expressed, implied or statutory, including but not limited
EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems
October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks
Guide to Data Field Encryption
Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations
Payments Transformation - EMV comes to the US
Accenture Payment Services Payments Transformation - EMV comes to the US In 1993 Visa, MasterCard and Europay (EMV) came together and formed EMVCo 1 to tackle the global challenge of combatting fraudulent
EMV in Hotels Observations and Considerations
EMV in Hotels Observations and Considerations Just in: EMV in the Mail Customer Education: Credit Card companies have already started customer training for the new smart cards. 1 Questions to be Answered
Preparing for EMV chip card acceptance
Preparing for EMV chip card acceptance Ben Brown Vice President, Regional Sales Manager, Wells Fargo Merchant Services Lily Page Vice President, Wholesale ereceivables, Wells Fargo Merchant Services June
Digital Payment Solutions TSYS Enterprise Tokenization:
Digital Payment Solutions TSYS Enterprise : FAQs & General Information FAQ TSYS DIGITAL DIGITAL PAYMENT PAYMENTS SOLUTIONS SOLUTIONS Account Holder Experience Apple Pay 1 Android Pay 2 Samsung Pay 2 Issuer
FUTURE PROOF TERMINAL QUICK REFERENCE GUIDE. Review this Quick Reference Guide to. learn how to run a sale, settle your batch
QUICK REFERENCE GUIDE FUTURE PROOF TERMINAL Review this Quick Reference Guide to learn how to run a sale, settle your batch and troubleshoot terminal responses. INDUSTRY Retail and Restaurant APPLICATION
EMV and Small Merchants:
September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service
THE APPEAL FOR CONTACTLESS PAYMENT 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR PAYMENT 4
CONTACTLESS THE APPEAL FOR CONTACTLESS 3 AVAILABLE CONTACTLESS TECHNOLOGIES 3 USING ISO 14443 BASED TECHNOLOGY FOR 4 DESIGNING AN EMV LIKE CONTACTLESS SYSTEM 5 INGENICO, LEADER IN CONTACTLESS TECHNOLOGY
mobile payment acceptance Solutions Visa security best practices version 3.0
mobile payment acceptance Visa security best practices version 3.0 Visa Security Best Practices for, Version 3.0 Since Visa s first release of this best practices document in 2011, we have seen a rapid
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP
THE FIVE Ws OF EMV BY DAVE EWALD GLOBAL EMV CONSULTANT AND MANAGER DATACARD GROUP WHERE IS THE U.S. PAYMENT CARD INDUSTRY NOW? WHERE IS IT GOING? Today, payment and identification cards of all types (credit
The Canadian Migration to EMV. Prepared By:
The Canadian Migration to EMV Prepared By: December 1993 Everyone But The USA Is Migrating The international schemes decided Smart Cards are the way forward Europay, MasterCard & Visa International Produced
Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance
Payment Security White Paper Protecting Cardholder Data Throughout Your Enterprise While Reducing the Costs of PCI Compliance Breaches happen across all industries as thieves look for vulnerabilities.
Credit Card Processing Overview
CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new
American Express Contactless Payments
PRODUCT CAPABILITY GUIDE American Express Contactless Payments American Express Contactless Payments Help Enable Increased Convenience For Card Members At The Point Of Sale American Express contactless
Android pay. Frequently asked questions
Android pay Frequently asked questions June 2015 Android Pay - FAQs In May 2015, Android Pay was announced by Google. Android Pay is Google s payments solution that allows consumers to do in-store and
Tokenization: FAQs & General Information. www.tsys.com BACKGROUND. GENERAL INFORMATION What is Tokenization?
FAQ Tokenization: FAQs & General Information BACKGROUND As technology evolves, consumers are increasingly making their purchases online or through mobile devices and digital wallet applications and their
We believe First Data is well positioned to take advantage of all of these trends given the breadth of our solutions and our global operating
Given recent payment data breaches, clients are increasingly demanding robust security and fraud solutions; and Financial institutions continue to outsource and leverage technology providers given their
EMV and Restaurants What you need to know! November 19, 2014
EMV and Restaurants What you need to know! Mike English Executive Director of Product Development Kristi Kuehn Sr. Director, Compliance November 9, 204 Agenda EMV overview Timelines Chip Card Liability
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards
RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:
Making Cloud-Based Mobile Payments a Reality with Digital Issuance, Tokenization, and HCE WHITE PAPER
Making Cloud-Based Mobile Payments a Reality with Digital Issuance, Tokenization, and HCE WHITE PAPER Why Cloud-Based Mobile Payments? The promise of mobile payments has captured the imagination of banks,
Mobile Payment: The next step of secure payment VDI / VDE-Colloquium. Hans-Jörg Frey Senior Product Manager May 16th, 2013
Mobile Payment: The next step of secure payment VDI / VDE-Colloquium May 16th, 2013 G&D has been growing through continuous innovation Server software and services Token and embedded security Cards for
Changing Consumer Purchasing Patterns. John Mayleben, CPP SVP, Technology and Product Development Michigan Retailers Association
Changing Consumer Purchasing Patterns John Mayleben, CPP SVP, Technology and Product Development Michigan Retailers Association Michigan Retailers Association! Michigan Retailers Association is trade
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means
EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved
CardControl. Credit Card Processing 101. Overview. Contents
CardControl Credit Card Processing 101 Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new and old
MasterCard Contactless Reader v3.0. INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0
MasterCard Contactless Reader v3.0 INTRODUCTION TO MASTERCARD CONTACTLESS READER v3.0 Introduction to MasterCard Contactless Reader v3.0 Contents 1. Introduction...2 2. Background...3 2.1 Reader Applications...3
OpenEdge Research & Development Group April 2015
2015: Security, Merchant Readiness & the Coming Liability Shift OpenEdge Research & Development Group April 2015 [email protected] openedgepay.com 2015: Security, Merchant Table of Contents The
Visa Recommended Practices for EMV Chip Implementation in the U.S.
CHIP ADVISORY #20, UPDATED JULY 11, 2012 Visa Recommended Practices for EMV Chip Implementation in the U.S. Summary As issuers, acquirers, merchants, processors and vendors plan and begin programs to adopt
E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y. February 2014
E M V I M P L E M E N TAT I O N T O O L S F O R S U C C E S S, P C I & S E C U R I T Y February 2014 A G E N D A EMV Overview EMV Industry Announcements EMV Transaction Differences, What to Expect Solution
toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard
toast EMV in 2015: How Restaurants Can Prepare for the New Chip-and-Pin Standard Table of Contents For more than 40 years, merchants and consumers have used magnetic stripe credit cards and compatible
Bringing Mobile Payments to Market for an International Retailer
Bringing Mobile Payments to Market for an International Retailer Founded in 2011, Clearbridge Mobile has emerged as a world class studio developing state of the art wearable and mobile wallet / payment
Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER
Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER SHAZAM, Senior Vice President Agenda The Ugly Fraud The Bad EMV? The Good Tokenization and Other Emerging Payment Options
EMV EMV TABLE OF CONTENTS
2 TABLE OF CONTENTS Intro... 2 Are You Ready?... 3 What Is?... 4 Why?... 5 What Does Mean To Your Business?... 6 Checklist... 8 3 U.S. Merchants 60% are expected to convert to -enabled devices by 2015.
A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.
A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role
PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:
What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers
Apple Pay. Frequently Asked Questions UK Launch
Apple Pay Frequently Asked Questions UK Launch Version 1.0 2015 First Data Corporation. All Rights Reserved. All trademarks, service marks and trade names referenced in this material are the property of
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Self-Assessment Questionnaire D Service Providers For use with PCI DSS Version 3.1 Revision 1.1 July 2015 Section 1: Assessment
Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009
Steps for staying PCI DSS compliant Visa Account Information Security Guide October 2009 The guide describes how you can make sure your business does not store sensitive cardholder data Contents 1 Contents
INTRODUCTION AND HISTORY
INTRODUCTION AND HISTORY EMV is actually younger than we all may think as it only became available, as a specification that could be implemented, in 1996. The evolution of EMV can be seen in the development
Entrust IdentityGuard
+1-888-437-9783 [email protected] IdentiSys.com Distributed by: Entrust IdentityGuard is an award-winning software-based authentication enterprises and governments. The solution serves as an organization's
Flexible and secure. acceo tender retail. payment solution. tender-retail.acceo.com
Flexible and secure payment solution acceo tender retail payment solution tender-retail.acceo.com Take control of your payment transactions ACCEO Tender Retail is a specialized middleware that handles
Information Technology
Credit Card Handling Security Standards Overview Information Technology This document is intended to provide guidance to merchants (colleges, departments, organizations or individuals) regarding the processing
Apple Pay. Frequently Asked Questions UK
Apple Pay Frequently Asked Questions UK Version 1.0 (July 2015) First Data Merchant Solutions is a trading name of First Data Europe Limited, a private limited company incorporated in England (company
Mobile Payment Solutions: Best Practices and Guidelines
Presented by the Mobile Payments Committee of the Electronic Transactions Association Mobile Payment Solutions: Best Practices and Guidelines ETA s Best Practices and Guidelines for Mobile Payment Solutions
welcome to liber8:payment
liber8:payment welcome to liber8:payment Our self-service kiosks free up staff time and improve the overall patron experience. liber8:payment further enhances these benefits by providing the convenience
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.1 April 2015 Section 1: Assessment Information Instructions for Submission
EMV and Encryption + Tokenization: A Layered Approach to Security
EMV and Encryption + Tokenization: A Layered Approach to Security 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material are the property of their respective
The EMV Readiness. Collis America. Guy Berg President, Collis America [email protected] +1 651 925 5411
The EMV Readiness Collis America Guy Berg President, Collis America [email protected] +1 651 925 5411 1 Collis Solutions & Markets Finance Consultancy Card Payments SEPA Financial Risk Mgmt Test Tools
EMV's Role in reducing Payment Risks: a Multi-Layered Approach
EMV's Role in reducing Payment Risks: a Multi-Layered Approach April 24, 2013 Agenda EMV Rationale Why is this worth the effort? Guides how we implement it EMV Vulnerability at the POS EMV Impact on CNP
Desktop Terminals. UK Terminals and Monthly Lease Payments (VAT Excluded) Ingenico ICT250CC. 22.97 + VAT per month. 48 month lease.
UK Terminals and Monthly Lease Payments (VAT Excluded) Desktop Terminals Ingenico ICT250CC 22.97 + VAT per month. 48 month lease. The ict250 has been designed with the goal of ensuring maximum ease- of-
ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments
A TO Z JARGON BUSTER A ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments ATM Automated Teller Machine. Unattended,
PayPass M/Chip Requirements. 10 April 2014
PayPass M/Chip Requirements 10 April 2014 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional information online.
Mitigating Fraud Risk Through Card Data Verification
Risk Management Best Practices 11 September 2014 Mitigating Fraud Risk Through Card Data Verification AP, Canada, CEMEA, LAC, U.S. Issuers, Processors With a number of cardholder payment options (e.g.,
EMV-TT. Now available on Android. White Paper by
EMV-TT A virtualised payment system with the following benefits: MNO and TSM independence Full EMV terminal and backend compliance Scheme agnostic (MasterCard and VISA supported) Supports transactions
What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization
Frequently Asked Questions What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization Issuers across the United States are beginning to embark in the planning and execution phase
Frequently Asked Questions
PCI Compliance Frequently Asked Questions Table of Content GENERAL INFORMATION... 2 PAYMENT CARD INDUSTRY DATA SECURITY STANDARD (PCI DSS)...2 Are all merchants and service providers required to comply
Card Technology Choices for U.S. Issuers An EMV White Paper
Card Technology Choices for U.S. Issuers An EMV White Paper This white paper is written with the aim of educating Issuers in the United States on the various technology choices that they have to consider
What is a Smart Card?
An Introduction to Smart Cards and RFIDs Prof. Keith E. Mayes [email protected] Director of the ISG - Smart Card Centre www.scc.rhul.ac.uk Learning Objectives (MSc MSc) Identify the various types
Introductions 1 min 4
1 2 1 Minute 3 Introductions 1 min 4 5 2 Minutes Briefly Introduce the topics for discussion. We will have time for Q and A following the webinar. 6 Randy - EMV History / Chip Cards /Terminals 5 Minutes
GLOBAL MOBILE PAYMENT TRANSACTION VALUE IS PREDICTED TO REACH USD 721 BILLION BY 2017. 1. MasterCard M/Chip Mobile Solution
INTRODUCING M/Chip Mobile SIMPLIFYING THE DEPLOYMENT OF SECURE ELEMENT MOBILE PAYMENTS OCTOBER 2015 GLOBAL MOBILE PAYMENT TRANSACTION VALUE IS PREDICTED TO REACH USD 721 BILLION BY 2017. 1 Research into
Requirements for an EMVCo Common Contactless Application (CCA)
Requirements for an EMVCo 20.01.2009 CIR Technical Working Group Table of Contents 1 Introduction...1 2 Common Contactless Application Business Requirements...2 3 Card Requirements...3 4 Terminal Requirements...4
The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses. National Computer Corporation www.nccusa.com
The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses The Impact of Emerging Payment Technologies on Retail and Hospitality Businesses Making the customer payment process convenient,
EESTEL. Association of European Experts in E-Transactions Systems. Apple iphone 6, Apple Pay, What else? EESTEL White Paper.
EESTEL White Paper October 29, 2014 Apple iphone 6, Apple Pay, What else? On 2014, September 9 th, Apple has launched three major products: iphone 6, Apple Watch and Apple Pay. On October 17 th, Apple
Advanced Authentication
White Paper Advanced Authentication Introduction In this paper: Introduction 1 User Authentication 2 Device Authentication 3 Message Authentication 4 Advanced Authentication 5 Advanced Authentication is
MasterCard Special Edition
2015 An Empower Federal Credit Union publication. MasterCard Special Edition Important details about our MasterCard conversion. Message From The President John Wakefield President/CEO Why MasterCard? For
WIRELESS - GPRS iwl250 POS SOLUTION
WIRELESS - GPRS iwl250 POS SOLUTION In this report, MONEXgroup presents the iwl250 Wireless POS Solution designed for mobility and accessibility of service. For businesses on-the-move, the iwl250 delivers
Mobile and Contactless Payment Security
Mobile and Contactless Payment Security v20111118 1/842 High Street East Kew 3102 Melbourne Australia Ph: +61 3 9846 2751 Fax: +61 3 9857 0350 Rambla de Catalunya 38, 8 planta 08007 Barcelona Spain Ph.
What is EMV? What is different?
U.S. consumers are receiving new debit and credit cards with embedded chip technology that better stores and protects cardholder information. These new chip cards are part of the new card standard, Europay,
EMV FAQs for developers
EMV FAQs for developers You accept the Information presented herein as is, without any representation as to its accuracy or completeness. What are the three levels of EMV certification? There are three
Frequently asked questions - Visa paywave
Frequently asked questions - Visa paywave What is Visa paywave? Visa paywave is a new contactless method of payment - the latest evolution in Visa payments. It is a simple, secure and quick payment method
Quick Merchant Operator Guide Emmy
Quick Merchant Operator Guide Emmy 1. Emmy Terminal Features ❶ ❶ Magnetic Strip Reader ❿ Bluetooth is not connected ❷ Integrated Contactless Reader ❷ ❿ Bluetooth is connected and ready ❸ Battery Indicator
Understand the Business Impact of EMV Chip Cards
Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability
Payment Card Industry (PCI) Data Security Standard
Payment Card Industry (PCI) Data Security Standard Attestation of Compliance for Onsite Assessments Service Providers Version 3.0 February 2014 Section 1: Assessment Information Instructions for Submission
PCI PA - DSS. Point ipos Implementation Guide. Version 1.01. VeriFone Vx820 using the Point ipos Payment Core
PCI PA - DSS Point ipos Implementation Guide VeriFone Vx820 using the Point ipos Payment Core Version 1.01 POINT TRANSACTION SYSTEMS AB Box 92031, 120 06 Stockholm, Tel. +46 8 566 287 00 www.point.se Page
E2EE and PCI Compliancy. Martin Holloway VSP Sales Director VeriFone NEMEA
E2EE and PCI Compliancy Martin Holloway VSP Sales Director VeriFone NEMEA Security Breaches In The News 2 Security Breaches In The News 3 Security Breaches In The News 4 Security Breaches In The News 5
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES
SAFE SYSTEM: SECURE APPLICATIONS FOR FINANCIAL ENVIRONMENTS USING MOBILE PHONES Sead Muftic 1, Feng Zhang 1 1Department of Computer and System Sciences, Royal Institute of Technology, Stockholm, Sweden
Figure 1: Attacker home-made terminal can read some data from your payment card in your pocket
A Touchy Subject There are increasingly frequent claims that contactless smart payment cards are insecure because they can be read while in your wallet or pocket. Can this really be true? And if so, is
PREVENTING PAYMENT CARD DATA BREACHES
NEW SCIENCE TRANSACTION SECURITY ARTICLE PREVENTING PAYMENT CARD DATA BREACHES DECEMBER 2014 UL.COM/NEWSCIENCE NEW SCIENCE TRANSACTION SECURITY OVERVIEW From research on the latest electronic transaction
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT
SECURITY IMPLICATIONS OF NFC IN AUTHENTICATION AND IDENTITY MANAGEMENT Dmitry Barinov SecureKey Technologies Inc. Session ID: MBS-W09 Session Classification: Advanced Session goals Appreciate the superior
AIS Webinar. Payment Application Security. Hap Huynh Business Leader Visa Inc. 1 April 2009
AIS Webinar Payment Application Security Hap Huynh Business Leader Visa Inc. 1 April 2009 1 Agenda Security Environment Payment Application Security Overview Questions and Comments Payment Application
CITGO CHIP & MOBILE TM. Quick-Start Guide YOUR CUSTOMERS. are
CITGO CHIP & MOBILE TM Quick-Start Guide are YOUR CUSTOMERS EMV CHIP CARD This... plus this... MOBILE PAYMENTS 1 Equals Success GET AHEAD FOR YOUR CUSTOMERS STAY AHEAD FOR YOUR BUSINESS. Fast Convenient
Payment Card Industry (PCI) Data Security Standard. PCI DSS Applicability in an EMV Environment A Guidance Document Version 1
Payment Card Industry (PCI) Data Security Standard PCI DSS Applicability in an EMV Environment A Guidance Document Version 1 Release date: 5 October 2010 Table of Contents 1 Executive Summary... 3 1.1
Better Security Through Mobile The One-Two Punch Industry Best Practices
Better Security Through Mobile The One-Two Punch Industry Best Practices PRESENTED BY THE PROCESSOR COUNCIL OF THE ELECTRONIC TRANSACTIONS ASSOCIATION Introduction The objective of this whitepaper is to
EMV mobile Point of Sale (mpos) Initial Considerations
EMV mobile Point of Sale EMV mobile Point of Sale (mpos) Initial Considerations Version 1.1 June 2014 2014 EMVCo, LLC ( EMVCo ). All rights reserved. Any and all uses of the EMV Specifications ( Materials
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking
Key Steps to Meeting PCI DSS 2.0 Requirements Using Sensitive Data Discovery and Masking SUMMARY The Payment Card Industry Data Security Standard (PCI DSS) defines 12 high-level security requirements directed
