Electronic Payments. EITN40 - Advanced Web Security

Size: px
Start display at page:

Download "Electronic Payments. EITN40 - Advanced Web Security"

Transcription

1 Electronic Payments EITN40 - Advanced Web Security 1

2 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN40 - Advanced Web Security 2

3 Credit card or Debit card Involved parties Cardholder Merchant Issuer The Cardholder s Bank Acquirer The Merchant s Bank The Network VisaNet for Visa BankNet for MasterCard For American Express, Discover Card, JCB and Diner s club, the issuer and the acquirer are the same We do not consider them here Issuer Cardholder VisaNet/ BankNet Merchant Acquirer EITN40 - Advanced Web Security 3

4 1. Cardholder presents card to Merchant 2. Merchant requests authorization from Acquirer 3. Authorization forwarded to Network Phase 1, Authorization 4. Network knows where to find Issuer and asks for authorization 5. Issuer sends authorization response to Network 6. Network forwards it to the Acquirer 7. Acquirer forwards it to the Merchant Issuer VisaNet/ BankNet 3 Acquirer Cardholder Merchant EITN40 - Advanced Web Security 4

5 1. Merchant sends approved authorizations to Acquirer (sent in a batch) 2. Acquirer credits Merchant s account and takes a fee 3. Bank sends authorization to the Network Phase 2, Clearing and Settlement 4. Network requests money from the issuer 5. Issuer sends money to Network 6. Network sends money to Bank and takes a fee 7. Cardholder pays invoice or has money directly debited her account with Issuer Cardholder s account 7 Issuer c VisaNet/ BankNet b 3 Acquirer 2 a Merchant s account 7 Cardholder 1 Merchant Fees: a: Mechant discout (All) b: Assessment (small) c: Interchange (large) Acquirer keeps a-b-c (small) EITN40 - Advanced Web Security 5

6 Transactions can be one of Card-Present Transaction (CP) Card-Not-Present Transaction (CNP) Two important security checks The card must not be a copy of a real card The cardholder must be the true owner EITN40 - Advanced Web Security 6

7 Cardholder, Card and Merchant are at the same place when purchase is made Physical stores, Hotels Card reader is typically used, magnetic stripe cards started to appear in the 60 s Magnetic stripe cards, security features Check that card is valid Physical protection, e.g., hologram Card verification value (CVV1) code on the magnetic stripe (verified by issuer) Check cardholder Signature Possible: PIN stored with issuer, provides two-factor authentication Reading the magnetic stripe + knowing PIN is often enough to use card Skimming 1958 EITN40 - Advanced Web Security 7

8 EMV (Europay, MasterCard, Visa) Since Jan 1, 2005: Merchants are responsible for fraud when EMV cards are not used (if they could have been used) Important features Difficult to copy Tamper resistant Secure storage Cryptographical computations Based on standards Common Criteria evaluation Still, cheap EITN40 - Advanced Web Security 8

9 Checking that card is valid Card includes public key, certificate of issuer and signed card data Network is root certificate Card can also have unique key pair for each card Card authentication Terminal verifies card data and digital signature Online or Offline Checking cardholder Cardholder verification PIN can be checked either online or offline Signature is also possible What should be done is based on policies set by issuer and acquirer EITN40 - Advanced Web Security 9

10 Mail/Telephone/Fax/Internet Important to verify that Alice is in possession of card and that she is the owner of the card Typically two ways Verify billing address Alice must present the billing address of the card Address Verification System (AVS) Expiry date CVV2/CVC2/CID this also checks that card is valid Verification code is not technically needed but typically gives Merchant less problem in case of chargebacks Merchant s are typically liable for CNP transactions CVV2 EITN40 - Advanced Web Security 10

11 Often, e-commerce is defined as purchasing over Internet Card-not-present transaction over Internet SSL/TLS makes a very good starting point. High security Free to use Built into web browsers However, Merchant will have access to card information Secure Electronic Transaction (SET) was first published in 1997 This technology separates internet payments from MOTO Internet EITN40 - Advanced Web Security 11

12 Initiated by Visa and MasterCard with several large companies involved Protocol is now dead, but it provides several important lessons Aims to separate payment information and order information Card number not given to Merchant PI = Payment information Only given to Issuer OI = Order information Only given to Merchant Three parties involved Cardholder Merchant Payment gateway EITN40 - Advanced Web Security 12

13 Concept introduced in SET PI H PIMD Customer private key H Sign Dual signature OI H OIMD Let Merchant see OI and PIMD PI and OI linked together, but Merchant cannot see PI EITN40 - Advanced Web Security 13

14 Divided into purchase request payment authorization payment capture (just finishing the actual payment, we skip this part) All parties have public/private key pair and a corresponding certificate 1. Initiate Request 2. Initiate Response 3. Purchase Request 6. PurchaseResponse 4. Authorization Request 5. Authorization Response 7. Capture Request 5. Capture Response EITN40 - Advanced Web Security 14

15 Initiate Request Cardholder requests Merchant and Payment Gateway s certificates Initiate Response Merchant returns certificates and a signed Transaction ID Cardholder prepares OI and PI and constructs the dual signature Transaction ID included in both PI is symmetrically encrypted, encryption key is encrypted with Gateway s public key Purchase Request Cardholder sends own certificate, dual signature, encrypted PI, PI digest and OI Merchant checks signature If all is ok, Purchase Response is sent 1. Initiate Request 2. Initiate Response 3. Purchase Request 6. PurchaseResponse EITN40 - Advanced Web Security 15

16 Authorization Request Merchant sends Encrypted PI, dual signature, OI digest, Signed Transaction ID, Cardholder s and Merchant s Certificates Everything is signed by merchant and symmetrically encrypted, encryption key is encrypted with Gateway s public key Gateway verifies certificates and signatures and checks that transaction ID is same in PI and message. Gateway authorizes payment with issuing bank Authorization Response Response that purchase is authorized is returned to merchant, symmetrically encrypted, encryption key is encrypted with Merchants public key Capture request and response Payment is finalized 1. Initiate Request 2. Initiate Response 3. Purchase Request 6. PurchaseResponse 4. Authorization Request 5. Authorization Response 7. Capture Request 8. Capture Response EITN40 - Advanced Web Security 16

17 Technically great Confidentiality, authentication, integrity and non-repudiation on message level Merchant does not get the card details Some reasons for failure: Cardholder needed to install special software on PC Possibly creating interoperability problems Problem with malware Not very simple for users with limited computer skills PKI infrastructure needed Complex scheme with large deployment costs EITN40 - Advanced Web Security 17

18 New attempt to secure online purchases Developed by Visa and adopted also by MasterCard Very different from SET Cardholder is authenticated with issuer Verify that she owns the card The rest is as usual Three Domains (the 3D in the name) Issuer domain The cardholder and the issuing bank Acquirer domain The Merchant and the acquiring bank Interoperability domain Domain connecting issuing and acquiring domain (card network and Internet) EITN40 - Advanced Web Security 18

19 Issuer implements an access control server and enrolls cardholder Merchant implements an MPI (or pays for a service that implements one) Card network has a Directory Server (DS) Can map card issuer Issuer/ACS DS Merchant/MPI Two phases when purchase is made Verify Enrollment Cardholder Authentication EITN40 - Advanced Web Security 19

20 1. Card details 2. Verify Enrollment Request (VEReq) Is card enrolled? 3. Is card enrolled? 4. Yes/No 5. Verify Enrollment Response (VERes) Yes/No If yes, URL to issuer s authentication is included in VERes Issuer Domain Interoperability Domain Acquirer Domain 1 2 Merchant/MPI 5 3 DS 4 Issuer/ACS EITN40 - Advanced Web Security 20

21 1. Payer Authentication Request (PAReq) - Open URL to authentication webpage in an iframe, including cardholder chosen hello message 2. Cardholder is authenticated 3. Payer Authentication Response (PARes) to MPI via web browser 1. Status result included in response 2. MPI can determine if authentication was successful and allow the purchase 4. Issuer sends result to history server so that disputes can be handled 5. Merchant can proceed by making authorization request, using the status result Issuer Domain Interoperability Domain 1 3 Acquirer Domain Merchant/MPI DS 5 4 Issuer/ACS History Server Acquirer EITN40 - Advanced Web Security 21

22 Merchant gets advantages Liability shifts from Merchant to Issuer/cardholder Protected from chargebacks guarantueed payment Issuer gets advantages Merchants are willing to accept the cards, so they are used more Easier to use than SET for cardholders Just get a password with your bank Still, some may find it annoying Liability possibly shifted to cardholder EITN40 - Advanced Web Security 22

23 Pop-up previously used instead of IFrame Difficult to know if you are really connected to Bank when password is given Activation during shopping - People are not focused on selecting secure passwords with bank when they are in the middle of a purchase Recommended reading: Murdoch and Anderson - Verified by Visa and MasterCard SecureCode: or, How Not to Design Authentication, 2010 EITN40 - Advanced Web Security 23

24 When using credit and debit cards, the issuing bank can track your shopping behaviour With cash, you are anonymous Well...there is a serial number on bills...but it is quite useless for tracking Using anonymous electronic coins is one alternative Two main problems that need to be solved Creation must be controlled by bank Should not be possible to double spend a coin Example: Principles behind DigiCash EITN40 - Advanced Web Security 24

25 Merchant Bank 4. Electronic coins Alice must not be able to create her own coins! Alice 1. Alice asks bank for electronic coins 2. Issue electronic coins 3. Send electronic coins to merchant upon buying something 4. Merchant deposits the electronic coins into his own account EITN40 - Advanced Web Security 25

26 Merchant Bank 4. Signed Electronic coins Alice Alice must not be able to create her own coins! Use digital signature Still, bank can trace coin back to Alice 1. Alice asks bank for electronic coins 2. Issue electronic coins 3. Send electronic coins to merchant upon buying something 4. Merchant deposits the electronic coins into his own account EITN40 - Advanced Web Security 26

27 Idea is to let someone sign a document without seeing the document....or digitally sign a number without seeing the number Recall RSA: Public modulus n and exponent e Private exponent d. Sign the value x by using hash function h() and computing Verify by computing...and check that EITN40 - Advanced Web Security 27

28 Multiplicative property of (plain) RSA: This is why we sign a hash (known redundancy)...but it can also be used to blind the signature 1. Pick random r 2. Let signer sign 3. Signature is 4. Multiply signature by inverse of r to get a signature on x EITN40 - Advanced Web Security 28

29 Alice generates two random numbers x is a coin r is a blinding value Let e = 3 Alice computes Bank and sends B to the bank Bank signs B and returns the signature B B d to Alice Withdrawal is complete! x is a coin signed by bank, but bank has not seen x, or h(x) Alice EITN40 - Advanced Web Security 29

30 Bank 3. Ask if x has been spent 4. Signed Electronic coins Merchant 2. Verify signature Alice computes When buying something 1. Alice sends to Merchant 2. Merchant verifies the signature using the Bank s public key (e = 3) 3. Merchant checks with bank that x has not been spent before 4. Merchant deposits x by sending to the bank Alice Bank knows it is a valid coin but it has not seen x before so it can not be traced to a specific person 1. Signed Electronic coins EITN40 - Advanced Web Security 30

31 Problems Step 3 is used to prevent double spending, but it is not very practical If Alice double spends, she is still anonymous and can not be punished The following two features will be added 1. Merchant does not have to contact the bank for every transaction in order to check double spending 2. If and only if Alice double spends, she will be identified by the bank Note that by solving the second problem, the first is implicitly solved EITN40 - Advanced Web Security 31

32 Alice chooses 2k quadruples of random numbers Let and compute These values are sent to the bank Bank uses cut-and-choose to verify that a random half of the B i correctly identifies Alice Rest are used to compute the blind signature, which is regarded as the coin. EITN40 - Advanced Web Security 32

33 1. Alice sends all B i to bank 2. Bank selects k indices randomly and sends these to Alice 3. Alice reveals how B i was computed for these indices. Sends 4. Bank checks that ID is ok for all EITN40 - Advanced Web Security 33

34 For all other indices, Bank computes and sends this value to Alice Alice extracts S which is the coin EITN40 - Advanced Web Security 34

35 Alice sends the signature to Merchant Merchant generates random sends to Alice Alice returns and Now, Merchant can verify the signature since but not identify Alice Merchant can at any time send coin, z and Alice s responses to Bank If Alice double spends, Bank can identify Alice since the new merchant will use another z EITN40 - Advanced Web Security 35

36 Alice can use a signature together with ID so she can not be framed by bank Zero-knowledge proofs can be used instead of cut-andchoose Alice proves that her ID is inside B i without revealing half of the B i values See evoting lecture for more info on this Minimize computations, storage space, amount of communication needed etc... EITN40 - Advanced Web Security 36

37 Card fees and interchange fees are sometimes large compared to purchase Buying/selling cheap items not (economically) possible Micropayment: payment where transaction fee is a substantial part of total transaction To merchant Fees Macropayment: Payment where transaction fee is a small part of total transaction To merchant Fees EITN40 - Advanced Web Security 37

38 All micropayment schemes are based on aggregation Transform several micropayments to one macropayment Three types of aggregation Session-level aggregation Universal aggregation Aggregation by intermediation EITN40 - Advanced Web Security 38

39 Alice makes several purchases from the same merchant Someone keeps track of total amount After some period of time all purchases are collected into one macropayment Phone bill is one example but users can not control how much money the company can charge We have to trust their system so they do not charge more than what we have authorized We can easily fix this (at least mathematically) micropayment Alice micropayment micropayment micropayment micropayment Merchant macropayment Bank EITN40 - Advanced Web Security 39

40 Alice (A) has a certificate signed by the Bank (B) When making purchases from a new Merchant, Alice computes a hash chain Alice commits to w 0 by sending to Merchant (M) Alice Merchant Merchant checks that Alice has account with Bank EITN40 - Advanced Web Security 40

41 When Alice buys something that costs 1 unit she sends to Merchant i is incremented for each micropayment Alice Merchant If something costs m units, i is incremented by m Merchant can always check that it is a valid payment But he can never compute EITN40 - Advanced Web Security 41

42 Commitment S and w t is sent to the bank when t is large enough Merchant Bank Bank verifies w t before crediting the Merchant s account and debiting Alice s account EITN40 - Advanced Web Security 42

43 Session-level aggregation only aggregates between one costumer and one merchant Universal aggregation is instead many-to-many micropayments macropayments Bank Alices Merchants EITN40 - Advanced Web Security 43

44 Probabilistic payments Micropayment is μ SEK Macropayment is γ SEK A macropayment is paid with probability s = μ / γ SEK First time Alice buys from Merchant, Merchant creates his own hash chain And sends m 0 to Alice, which is included in her commitment If then Alice pays γ SEK EITN40 - Advanced Web Security 44

45 Alice Merchant Alice can verify that payment must be made Bank EITN40 - Advanced Web Security 45

46 Problems Interaction Psychological problem for Alice She sometimes pays more than she has spent. Improvement: Peppercoin Alice never pays more than she has actually spent and merchant always gets γ SEK Bank takes the psychological problem Less, or no, interaction EITN40 - Advanced Web Security 46

47 Basic principles T is info about purchase S is a number that is incrementing for each micropayment F is a function mapping a binary string to a number between 0 and 1 Alice sends to Merchant Alice Macropayment is made if Merchant EITN40 - Advanced Web Security 47

48 Basic principles If macropayment should be made, the data is sent to the bank Merchant Bank Bank keeps record of highest S that has been paid, Bank verifies signatures Credits merchant s account with γ SEK Debits Alice s account with updated as Need to make sure that S is not reused with different merchants EITN40 - Advanced Web Security 48

49 A third party is placed inbetween users and merchants to keep track of all micropayments When a user has paid enough, he/she will be charged by the intermediary Or he/she will pre-pay a certain number of transactions When merchant has received enough, he will get transaction from intermediary EITN40 - Advanced Web Security 49

50 A currency of its own Money is printed within the system No issuer Completely decentralized Peer-to-peer No banks involved Idea: Use asymmetric cryptography Money is owned by public key Anonymous Can be represented by QR-code Transferred to a new public key by signing a transaction with the corresponding private key Simple enough, but what about double spending? EITN40 - Advanced Web Security 50

51 Transactions tied together New public key can be used for each transaction Not possible to track history Each user has many addresses Broadcast transaction to everyone Transaction From: To: Signature: EITN40 - Advanced Web Security 51

52 1 hash: 26a6230f29715cfbb19b be3195b837f667b2c6a46ac6adee 2 in: 3 prev_out: 4 hash: 3e5969d6314cdf5b8...edad50c1eaea3ae7bc94cb44479c82 5 n: 1 6 scriptsig: cd cef0b2360f51aa43ca2b e744fd5b041b...a6b888082c839368e510134a3251ab 8 out: 9 value: , 10 scriptpubkey: fa532de64071fb72198d17fc4ebdc0210d value: , 13 scriptpubkey: 07c017250f85b2590a31730c fd83dcc62 Hash of transaction, identifies this transaction Inputs Refer to previous output Public key and signature to authorize use of that output Outputs Send some money to one public key Send some money to another public key EITN40 - Advanced Web Security 52

53 In1 Out1 Out2 Out3 In1 Out1 Out2 In1 In2 Out1 In1 Out1 Out2 In1 In2 Out1 In1 Out1 In1 Out1 In1 In2 Out1 Out2 unused EITN40 - Advanced Web Security 53

54 Still need to fix double spending...and this is where it gets interesting Proof-of-work: It requires a large amount of work in order to make a transaction valid Transactions are broadcasted publicly Received transactions are combined into one block Block is validated by adding it to a block chain Block x Block x+1 Block x+2 Transaction i Transaction i+1 Transaction i+2 Transaction j Transaction j+1 Transaction j+2 Transaction k Transaction k+1 Transaction k+2 EITN40 - Advanced Web Security 54

55 1 hash: f4f1...3a8a001c3307e0e6cbea474798a223e9e50, 2 prev_block: a4d5d ceb9f8f52f86aeeef8e3b52464, 3 mrkl_root: 18353cf8f8f4bfa2ecff...923b40871a016d1793f1a946a1201, 4 nonce: , 5 tx: Blocks linked together by referring to previous block Hash value must be smaller than some number Updated continuously so that it always takes about 10 minutes for the world to compute a valid block Nonce used to give variations in hash EITN40 - Advanced Web Security 55

56 A transaction is valid when it is in a valid block Well not necessarily The block chain can, and will, fork Block Block Block Block Block Block The longest fork is by definition valid So people will stop working on short ones When a transaction is buried under enough blocks, it is safe to assume that it will not change Around 5 or 6 should be enough (about 1 hour) EITN40 - Advanced Web Security 56

57 Computers dedicated to creating valid blocks are called miners Why would anyone work on creating a valid block? The creator puts a transaction of 25 BTC to himself as first transaction in a block! New money is entered into the system Transaction fees are optional Difference between input and output in a transaction If input sums to 30 BTC and output sums to 29 BTC there are 1 BTC left which the miner can send to himself Transaction will be included in a block faster if there is a transaction fee since miners have incentive to include it in the block EITN40 - Advanced Web Security 57

58 Changing past transactions will require that a new chain is computed which is longer than the one used Would make the new chain the real one Block Block Block Block Block Block Block Block Attacker require majority of total computing power EITN40 - Advanced Web Security 58

59 Reward will decrease over time Number of BTC will be around 21 million Gives deflation Very similar to pyramid game Early adopters will gain the most Private keys are sometimes lost This money can never be used The anonymity enables illegal use EITN40 - Advanced Web Security 59

2015-11-02. Electronic Payments Part 1

2015-11-02. Electronic Payments Part 1 Electronic Payments Part Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin Bitcoin EITN4 - Advanced

More information

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015 Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2015 Outline 1. Card payment 2. (Anonymous digital cash) 3. Bitcoin 2 CARD PAYMENT 3 Bank cards Credit or debit card

More information

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc. Payment Methods The cost of doing business Michelle Powell - BASYS Processing, Inc. You ve got to spend money, to make money Major Industry Topics Industry Process Flow PCI DSS Compliance Risks of Non-Compliance

More information

Electronic payment systems

Electronic payment systems Electronic payment systems overview of basic concepts credit-card based systems (MOTO, SSL, SET) electronic cash systems (DigiCash) micropayment schemes (PayWord, probabilistic schemes) brief history of

More information

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011

Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 Enhancing Payment Card Security New Measures to be Phased in from 2 nd Quarter 2010 to 1 st Quarter 2011 On 5 th March 2010, The Association of Banks in Singapore announced key measures to adopt a holistic

More information

Electronic Cash Payment Protocols and Systems

Electronic Cash Payment Protocols and Systems Electronic Cash Payment Protocols and Systems Speaker: Jerry Gao Ph.D. San Jose State University email: jerrygao@email.sjsu.edu URL: http://www.engr.sjsu.edu/gaojerry May, 2000 Presentation Outline - Overview

More information

Verified by Visa. Acquirer and Merchant Implementation Guide. U.S. Region. May 2011

Verified by Visa. Acquirer and Merchant Implementation Guide. U.S. Region. May 2011 Verified by Visa Acquirer and Merchant Implementation Guide U.S. Region Verified by Visa Acquirer and Merchant Implementation Guide U.S. Region VISA PUBLIC DISCLAIMER: THE RECOMMENDATIONS CONTAINED HEREIN

More information

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn Web Payment Security A discussion of methods providing secure communication on the Internet Group Members: Peter Heighton Zhao Huang Shahid Kahn 1. Introduction Within this report the methods taken to

More information

Web Security. Mahalingam Ramkumar

Web Security. Mahalingam Ramkumar Web Security Mahalingam Ramkumar Issues Phishing Spreading misinformation Cookies! Authentication Domain name DNS Security Transport layer security Dynamic HTML Java applets, ActiveX, JavaScript Exploiting

More information

ELECTRONIC COMMERCE WORKED EXAMPLES

ELECTRONIC COMMERCE WORKED EXAMPLES MODULE 13 ELECTRONIC COMMERCE WORKED EXAMPLES 13.1 Explain B2B e-commerce using an example of a book distributor who stocks a large number of books, which he distributes via a large network of book sellers.

More information

What Merchants Need to Know About EMV

What Merchants Need to Know About EMV Effective November 1, 2014 1. What is EMV? EMV is the global standard for card present payment processing technology and it s coming to the U.S. EMV uses an embedded chip in the card that holds all the

More information

Electronic Payment Systems

Electronic Payment Systems Electronic Payment Systems In any commercial transaction payment is an integral part for goods supplied. Four types of payments may be made in e-commerce they are Credit card payments Electronic cheque

More information

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University October 2015 1 List of Figures Contents 1 Introduction 1 2 History 2 3 Public Key Infrastructure (PKI) 3 3.1 Certificate

More information

Chapter 10. e-payments

Chapter 10. e-payments Chapter 10 e-payments AIS 360Prentice Hall, 2003 1 Learning Objectives Understand the crucial factors determining the success of e-payment methods Describe the key elements in securing an e-payment Discuss

More information

Payment systems. Tuomas Aura T-110.4206 Information security technology

Payment systems. Tuomas Aura T-110.4206 Information security technology Payment systems Tuomas Aura T-110.4206 Information security technology Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2 MONEY TRANSFER 3 Common payment systems Cash Electronic credit

More information

First Data E-commerce Payments Gateway

First Data E-commerce Payments Gateway First Data E-commerce Payments Gateway High performance payment processing solution designed specifically to meet the requirements of global Card-Not-Present PSP When you partner with First Data for your

More information

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES

MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES MOBILE CHIP ELECTRONIC COMMERCE: ENABLING CREDIT CARD PAYMENT FOR MOBILE DEVICES Marko Schuba and Konrad Wrona Ericsson Research, Germany ABSTRACT This paper describes the Mobile Chip Electronic Commerce

More information

The Definition of Electronic Payment

The Definition of Electronic Payment Part IX: epayment Learning Targets What are the electronic means of payment? What is the difference between pico-, micro- and macro-payment? How can we classify the e-payment systems? How can secure transactions

More information

Payment systems. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2012

Payment systems. Tuomas Aura T-110.4206 Information security technology. Aalto University, autumn 2012 Payment systems Tuomas Aura T-110.4206 Information security technology Aalto University, autumn 2012 Outline 1. Money transfer 2. Card payments 3. Anonymous payments 2 MONEY TRANSFER 3 Common payment systems

More information

Payments Industry Glossary

Payments Industry Glossary Payments Industry Glossary 2012 First Data Corporation. All trademarks, service marks and trade names referenced in this material are the property of their respective owners. A ACH: Automated Clearing

More information

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved.

A Guide to EMV. Version 1.0 May 2011. Copyright 2011 EMVCo, LLC. All rights reserved. A Guide to EMV Version 1.0 May 2011 Objective Provide an overview of the EMV specifications and processes What is EMV? Why EMV? Position EMV in the context of the wider payments industry Define the role

More information

Virtual Payment Client Integration Reference. April 2009 Software version: 3.1.21.1

Virtual Payment Client Integration Reference. April 2009 Software version: 3.1.21.1 Virtual Payment Client Integration Reference April 2009 Software version: 3.1.21.1 Copyright MasterCard and its vendors own the intellectual property in this Manual exclusively. You acknowledge that you

More information

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015

Securing Card-Not-Present Transactions through EMV Authentication. Matthew Carter and Brienne Douglas December 18, 2015 Securing Card-Not-Present Transactions through EMV Authentication Matthew Carter and Brienne Douglas December 18, 2015 Outline Problem Card-Not-Present (CNP) vs. PayPal EMV Technology EMV CNP Experiment

More information

ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments

ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments A TO Z JARGON BUSTER A ACQUIRER OR ACQUIRING BANK A financial institution (often a bank) where a merchant has an account to process transactions and card payments ATM Automated Teller Machine. Unattended,

More information

Cryptography: Authentication, Blind Signatures, and Digital Cash

Cryptography: Authentication, Blind Signatures, and Digital Cash Cryptography: Authentication, Blind Signatures, and Digital Cash Rebecca Bellovin 1 Introduction One of the most exciting ideas in cryptography in the past few decades, with the widest array of applications,

More information

Elavon Payment Gateway- 3D Secure

Elavon Payment Gateway- 3D Secure Elavon Payment Gateway- 3D Secure Service Overview April 2013 Payer Authentication Service What Is Payer Authentication? When selling on the internet and accepting payments by credit and debit card it

More information

Electronic Payment Systems

Electronic Payment Systems Foundations of Secure e-commerce (bmevihim219) Dr. Levente Buttyán Associate Professor BME Hálózati Rendszerek és Szolgáltatások Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu,

More information

e Merchant Plug-in (MPI) Integration & User Guide

e Merchant Plug-in (MPI) Integration & User Guide e Merchant Plug-in (MPI) Integration & User Guide Enabling merchants to integrate their payment processing with SECPay s 3-D Secure Merchant Plug In (MPI) solution. This document provides the details of

More information

Online Payment Processing Definitions From Credit Research Foundation (http://www.crfonline.org/)

Online Payment Processing Definitions From Credit Research Foundation (http://www.crfonline.org/) Online Payment Processing Definitions From Credit Research Foundation (http://www.crfonline.org/) The following glossary represents definitions for commonly-used terms in online payment processing. Address

More information

Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof

Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof Security Failures in Smart Card Payment Systems: Tampering the Tamper-Proof Saar Drimer Steven J. Murdoch Ross Anderson www.cl.cam.ac.uk/users/{sd410,sjm217,rja14} Computer Laboratory www.torproject.org

More information

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status 10 Secure Electronic Transactions: Overview, Capabilities, and Current Status Gordon Agnew A&F Consulting, and University of Waterloo, Ontario, Canada 10.1 Introduction Until recently, there were two primary

More information

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means EMV and Chip Cards Key Information On What This Is, How It Works and What It Means Document Purpose This document is intended to provide information about the concepts behind and the processes involved

More information

4 Electronic Payment Systems

4 Electronic Payment Systems 4 Electronic Payment Systems 4.1 Traditional Payment Systems 4.2 Credit-Card Based Payment Standards 4.3 Electronic Cash and Micropayments 4.4 Practice of E-Payment Literature: Donal O Mahony, Michael

More information

The Canadian Migration to EMV. Prepared By:

The Canadian Migration to EMV. Prepared By: The Canadian Migration to EMV Prepared By: December 1993 Everyone But The USA Is Migrating The international schemes decided Smart Cards are the way forward Europay, MasterCard & Visa International Produced

More information

Guide to Data Field Encryption

Guide to Data Field Encryption Guide to Data Field Encryption Contents Introduction 2 Common Concepts and Glossary 3 Encryption 3 Data Field Encryption 3 Cryptography 3 Keys and Key Management 5 Secure Cryptographic Device 7 Considerations

More information

PayLeap Guide. One Stop

PayLeap Guide. One Stop PayLeap Guide One Stop PayLeap does it all. Take payments in person? Check. Payments over the phone or by mail? Check. Payments from mobile devices? Of course. Online payments? No problem. In addition

More information

CREDIT CARD PROCESSING GLOSSARY OF TERMS

CREDIT CARD PROCESSING GLOSSARY OF TERMS CREDIT CARD PROCESSING GLOSSARY OF TERMS 3DES A highly secure encryption system that encrypts data 3 times, using 3 64-bit keys, for an overall encryption key length of 192 bits. Also called triple DES.

More information

A Scheme for Analyzing Electronic Payment Systems

A Scheme for Analyzing Electronic Payment Systems A Scheme for Analyzing Electronic Payment Systems Lucas de Carvalho Ferreira IC/Unicamp and DEX/UFLA DEX, Campus da UFLA 37200-000 Lavras MG Brasil lucasf@ufla.br Ricardo Dahab IC/Unicamp Caixa Postal

More information

Cost-management strategies. Your guide to accepting card payments cost-effectively

Cost-management strategies. Your guide to accepting card payments cost-effectively Cost-management strategies Your guide to accepting card payments cost-effectively Table of Contents Guidance from Wells Fargo Merchant Services...3 The secret to better interchange rates...4 Why interchange

More information

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.

associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys. Information Security (bmevihim100) Dr. Levente Buttyán associate professor BME Híradástechnikai Tanszék Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu Outline Public

More information

Processing credit card payments over the internet. The business of getting paid.

Processing credit card payments over the internet. The business of getting paid. Processing credit card payments over the internet. The business of getting paid. X Tap into the vast potential of the Internet today with WIPS Plus. The internet is a huge opportunity for businesses large

More information

Secure e-commerce. Information Security (bmevihim100) Dr. Levente Buttyán

Secure e-commerce. Information Security (bmevihim100) Dr. Levente Buttyán Information Security (bmevihim100) Dr. Levente Buttyán associate professor BME Dept of Networked Systems and Services Lab of Cryptography and System Security (CrySyS) buttyan@hit.bme.hu, buttyan@crysys.hu

More information

An access number, dialed by a modem, that lets a computer communicate with an Internet Service Provider (ISP) or some other service provider.

An access number, dialed by a modem, that lets a computer communicate with an Internet Service Provider (ISP) or some other service provider. TERM DEFINITION Access Number Account Number Acquirer Acquiring Bank Acquiring Processor Address Verification Service (AVS) Association Authorization Authorization Center Authorization Fee Automated Clearing

More information

Chapter 5. Online Payment System. Types of Payment Systems. Cash Checking Transfer Credit Card Stored Value Accumulating Balance

Chapter 5. Online Payment System. Types of Payment Systems. Cash Checking Transfer Credit Card Stored Value Accumulating Balance Chapter 5 Online Payment System Copyright 2007 Pearson Education, Inc. Slide 5-64 Types of Payment Systems Cash Checking Transfer Credit Card Stored Value Accumulating Balance Copyright 2007 Pearson Education,

More information

Authentication. Agenda. IT Security course Lecture April 14 th 2003. Niels Christian Juul 2. April 14th, 2003

Authentication. Agenda. IT Security course Lecture April 14 th 2003. Niels Christian Juul 2. April 14th, 2003 Authentication IT Security course Lecture April 14 th 2003 Niels Christian Juul Computer Science, building 42.1 Roskilde University Universitetsvej 1 P.O. Box 260 DK-4000 Roskilde Denmark Phone: +45 4674

More information

Internet Authentication Procedure Guide

Internet Authentication Procedure Guide Internet Authentication Procedure Guide Authenticating cardholders successfully V10.0 Released May 2012 Software Version: Internet Authentication Protocol COPYRIGHT NOTICE No part of this publication may

More information

Distributed Public Key Infrastructure via the Blockchain. Sean Pearl smp1697@cs.rit.edu April 28, 2015

Distributed Public Key Infrastructure via the Blockchain. Sean Pearl smp1697@cs.rit.edu April 28, 2015 Distributed Public Key Infrastructure via the Blockchain Sean Pearl smp1697@cs.rit.edu April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other

More information

CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb

CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb CRM4M Accounting Set Up and Miscellaneous Accounting Guide Rev. 10/17/2008 rb Topic Page Chart of Accounts 3 Creating a Batch Manually 8 Closing a Batch Manually 11 Cancellation Fees 17 Check Refunds 19

More information

Network Security Protocols

Network Security Protocols Network Security Protocols EE657 Parallel Processing Fall 2000 Peachawat Peachavanish Level of Implementation Internet Layer Security Ex. IP Security Protocol (IPSEC) Host-to-Host Basis, No Packets Discrimination

More information

Payment authorization Payment capture Table 1.3 SET Transaction Types

Payment authorization Payment capture Table 1.3 SET Transaction Types Table 1.3 lists the transaction types supported by SET. In what follows we look in some detail at the following transactions: Purchase request Payment authorization Payment capture Cardholder registration

More information

CyberSource Payer Authentication

CyberSource Payer Authentication Title Page CyberSource Payer Authentication Using the Simple Order API September 2015 CyberSource Corporation HQ P.O. Box 8999 San Francisco, CA 94128-8999 Phone: 800-530-9095 CyberSource Contact Information

More information

TABLE OF CONTENTS INTRODUCTORY THE FOUNDATION OF E & M. 4. E-Commerce & M-Commerce Technologies. (c) Internet Based Research Approaches.

TABLE OF CONTENTS INTRODUCTORY THE FOUNDATION OF E & M. 4. E-Commerce & M-Commerce Technologies. (c) Internet Based Research Approaches. TABLE OF CONTENTS Chapter 1 INTRODUCTORY THE FOUNDATION OF E & M 1. Conceptual Analysis of E-Commerce. 2. Objective of Study. 3. What is M-Commerce. 4. E-Commerce & M-Commerce Technologies. 5. Scope of

More information

Accepting Credit Cards 101

Accepting Credit Cards 101 1 Accepting Credit Cards 101 Payment Cards: A Brief History and the Invention of. The Key Players: The Associations, Member Banks, Processors, Service Providers, Agents, Cardholders, and Merchants : Card

More information

What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization

What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization Frequently Asked Questions What Issuers Need to Know Top 25 Questions on EMV Chip Cards and Personalization Issuers across the United States are beginning to embark in the planning and execution phase

More information

Merchant Account Service

Merchant Account Service QuickBooks Online Edition Feature Guide Merchant Account Service C o n t e n t s Introduction............................. 2 What is a merchant account?.................. 2 What types of credit cards can

More information

PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc.

PCI 3.1 Changes. Jon Bonham, CISA Coalfire System, Inc. PCI 3.1 Changes Jon Bonham, CISA Coalfire System, Inc. Agenda Introduction of Coalfire What does this have to do with the business office Changes to version 3.1 EMV P2PE Questions and Answers Contact Information

More information

Credit card: permits consumers to purchase items while deferring payment

Credit card: permits consumers to purchase items while deferring payment General Payment Systems Cash: portable, no authentication, instant purchasing power, allows for micropayments, no transaction fee for using it, anonymous But Easily stolen, no float time, can t easily

More information

Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist

Credit/Debit Card Processing Requirements and Best Practices. Adele Honeyman Oregon State Treasury Training Specialist Credit/Debit Card Processing Requirements and Best Practices Adele Honeyman Oregon State Treasury Training Specialist 1 What? What do I need to know about excepting credit cards? Who s involved, how it

More information

Swedbank Payment Portal Implementation Overview

Swedbank Payment Portal Implementation Overview Swedbank Payment Portal Implementation Overview Product: Hosted Pages Region: Baltics September 2015 Version 1.0 Contents 1. Introduction 1 1.1. Audience 1 1.2. Hosted Page Service Features 1 1.3. Key

More information

Version 1.0 STRATEGIC PARTNER TRAINING MANUAL

Version 1.0 STRATEGIC PARTNER TRAINING MANUAL Version 1.0 STRATEGIC PARTNER TRAINING MANUAL Table of Contents Introduction... 3 Features of the Strategic Partnership... 3 Responsibilities... 3 Billing... 4 Gateway Service... 4 Risk... 4 I. PRODUCTS/SERVICES...

More information

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows: What is PCI DSS? PCI DSS is an acronym for Payment Card Industry Data Security Standards. PCI DSS is a global initiative intent on securing credit and banking transactions by merchants & service providers

More information

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2

SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 SEZ SEZ Online Manual Digital Signature Certficate [DSC] V Version 1.2 Table of Contents 1 Introduction...2 2 Procurement of DSC...3 3 Installation of DSC...4 4 Procedure for entering the DSC details of

More information

EMV and Small Merchants:

EMV and Small Merchants: September 2014 EMV and Small Merchants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service

More information

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005

Lecture 31 SSL. SSL: Secure Socket Layer. History SSL SSL. Security April 13, 2005 Lecture 31 Security April 13, 2005 Secure Sockets Layer (Netscape 1994) A Platform independent, application independent protocol to secure TCP based applications Currently the most popular internet crypto-protocol

More information

Credit Card Processing Overview

Credit Card Processing Overview CardControl 3.0 Credit Card Processing Overview Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new

More information

The e-payment Systems

The e-payment Systems The e-payment Systems Electronic Commerce (E-Commerce) Commerce refers to all the activities the purchase and sales of goods or services. Marketing, sales, payment, fulfillment, customer service Electronic

More information

MasterCard In tern et Gatew ay Service (MIGS)

MasterCard In tern et Gatew ay Service (MIGS) Master Card Inter national MasterCard In tern et Gatew ay Service (MIGS) MIGS Payment Client Reference Manual Prepared By: Patrick Hayes Department: Principal Consultant, ebusiness Solutions Date Written:

More information

The World of Emerging Payment Systems A Brief Introduction

The World of Emerging Payment Systems A Brief Introduction The World of Emerging Payment Systems A Brief Introduction Joseph M. Vincent Director of Regulatory & Legal Affairs Washington State Department of Financial Institutions Presentation to Financial Management

More information

Understand the Business Impact of EMV Chip Cards

Understand the Business Impact of EMV Chip Cards Understand the Business Impact of EMV Chip Cards 3 What About Mail/Telephone Order and ecommerce? 3 What Is EMV 3 How Chip Cards Work 3 Contactless Technology 4 Background: Behind the Curve 4 Liability

More information

MasterCard SecureCode

MasterCard SecureCode MasterCard SecureCode Merchant Implementation Guide 17 June 2014 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional

More information

Securing the Payments System. The facts about fraud prevention

Securing the Payments System. The facts about fraud prevention Securing the Payments System The facts about fraud prevention Contents Introduction 3 Visa s Security Programme 4 Fraud Types and Threats 6 Fraud Statistics and Research 7 Visa s Security Agenda for New

More information

GP webpay - service description

GP webpay - service description GP webpay - service description Version: 2.0 Global Payments Europe, s.r.o. Created 15.10.2015 Last update 14.12.2015 Author Dimitrij Holovka Manager Approved by Version 2.0 Confidentiality Confidential

More information

CPIM Academy. Cash 257 Merchant Services and Revenue Collection

CPIM Academy. Cash 257 Merchant Services and Revenue Collection CPIM Academy Cash 257 Merchant Services and Revenue Collection 2015 Objectives Feel prepared to discuss/understand basics of merchant processing Understand Service Fees Difference between credit and debit

More information

What is EMV? What is different?

What is EMV? What is different? U.S. consumers are receiving new debit and credit cards with embedded chip technology that better stores and protects cardholder information. These new chip cards are part of the new card standard, Europay,

More information

Secure Payment. Vijay Atluri

Secure Payment. Vijay Atluri Secure Payment Vijay Atluri 1 Digital Currency- Characteristics Relies on IT and high speed communications networks to store, transmit and receive representations of value Relies on cryptography to provide

More information

Chargebacks: Another Payment Card Acceptance Cost for Merchants

Chargebacks: Another Payment Card Acceptance Cost for Merchants Chargebacks: Another Payment Card Acceptance Cost for Merchants Fumiko Hayashi, Zach Markiewicz, and Richard J. Sullivan January 216 RWP 16-1 http://dx.doi.org/1.18651/rwp216-1 Chargebacks: Another Payment

More information

Digital Cash. is not a check, credit card or a debit card. They leave audit trails. can be sent through computer networks.

Digital Cash. is not a check, credit card or a debit card. They leave audit trails. can be sent through computer networks. Digital Cash is not a check, credit card or a debit card. They leave audit trails. is anonymous and untraceable. can be sent through computer networks. can be used off-line (not connected to a bank). is

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

Retrieval & Chargeback Best Practices

Retrieval & Chargeback Best Practices Retrieval & Chargeback Best Practices A Merchant User s Guide to Help Manage Disputes Version Three November, 2010 www.firstdata.com THIS PAGE INTENTIONALLY LEFT BLANK. Developed by: First Data Payment

More information

OXY GEN GROUP. pay. payment solutions

OXY GEN GROUP. pay. payment solutions OXY GEN GROUP pay payment solutions hello. As UK CEO, I m delighted to welcome you to Oxygen8. We ve been at the forefront of multi-channel solutions since 2000. Headquartered in Birmingham, UK, we have

More information

Understanding digital certificates

Understanding digital certificates Understanding digital certificates Mick O Brien and George R S Weir Department of Computer and Information Sciences, University of Strathclyde Glasgow G1 1XH mickobrien137@hotmail.co.uk, george.weir@cis.strath.ac.uk

More information

Internet Payment Gateway

Internet Payment Gateway Internet Payment Gateway Merchant Administration Console Merchant Services TABLE OF CONTENTS Introduction to the Merchant Administration Console... 5 Console Overview... 5 Login Conditions... 5 Merchant

More information

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005 Payment Systems for E-Commerce Shengyu Jin 4/27/2005 Reference Papers 1. Research on electronic payment model,2004 2. An analysis and comparison of different types of electronic payment systems 2001 3.

More information

An Analysis of the Bitcoin Electronic Cash System

An Analysis of the Bitcoin Electronic Cash System An Analysis of the Bitcoin Electronic Cash System Danielle Drainville University of Waterloo December 21, 2012 1 Abstract In a world that relies heavily on technology, privacy is sought by many. Privacy,

More information

Application of Electronic Currency on the Online Payment System like PayPal

Application of Electronic Currency on the Online Payment System like PayPal Application of Electronic Currency on the Online Payment System like PayPal Rafael Martínez Peláez, Francisco J. Rico Novella Technical University of Catalonia (UPC), Department of Telematics Engineering

More information

A: This will depend on a number of factors. Things to consider and discuss with a member of our ANZ Merchant Services team are:

A: This will depend on a number of factors. Things to consider and discuss with a member of our ANZ Merchant Services team are: 1 ANZ egate FAQ s Contents Section 1 General information: page 1 Section 2 Technical information for ANZ egate Merchants: page 5 November 2010 Section 1 General information Q: What is ANZ egate? A: ANZ

More information

FUTURE PROOF TERMINAL QUICK REFERENCE GUIDE. Review this Quick Reference Guide to. learn how to run a sale, settle your batch

FUTURE PROOF TERMINAL QUICK REFERENCE GUIDE. Review this Quick Reference Guide to. learn how to run a sale, settle your batch QUICK REFERENCE GUIDE FUTURE PROOF TERMINAL Review this Quick Reference Guide to learn how to run a sale, settle your batch and troubleshoot terminal responses. INDUSTRY Retail and Restaurant APPLICATION

More information

CardControl. Credit Card Processing 101. Overview. Contents

CardControl. Credit Card Processing 101. Overview. Contents CardControl Credit Card Processing 101 Overview Credit card processing is a very complex and important system for anyone that sells goods. This guide will hopefully help educate and inform new and old

More information

Overview of CSS SSL. SSL Cryptography Overview CHAPTER

Overview of CSS SSL. SSL Cryptography Overview CHAPTER CHAPTER 1 Secure Sockets Layer (SSL) is an application-level protocol that provides encryption technology for the Internet, ensuring secure transactions such as the transmission of credit card numbers

More information

Internet Usage (as of November 1, 2011)

Internet Usage (as of November 1, 2011) ebusiness Chapter 11 Online Payment Systems Internet Usage (as of November 1, 2011) United States Population: 312,521,655 Internet users: 245,000,000 (78.4% of population) Facebook users: 151,350,260 (61.8%

More information

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems

EMV and Restaurants: What you need to know. Mike English. October 2014. Executive Director, Product Development Heartland Payment Systems October 2014 EMV and Restaurants: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks, service marks

More information

Merchant e-solutions Payment Gateway Back Office User Guide. Merchant e-solutions January 2011 Version 2.5

Merchant e-solutions Payment Gateway Back Office User Guide. Merchant e-solutions January 2011 Version 2.5 Merchant e-solutions Payment Gateway Back Office User Guide Merchant e-solutions January 2011 Version 2.5 This publication is for information purposes only and its content does not represent a contract

More information

What is Interchange. How Complex is Interchange?

What is Interchange. How Complex is Interchange? What is Interchange The foundation of the entire Bankcard Processing industry s cost structure. Interchange is the wholesale price, charged by Card Issuing Bank, for Authorization and Settlement of a credit

More information

Adjustment A debit or credit to a cardholder or merchant account to correct a transaction error

Adjustment A debit or credit to a cardholder or merchant account to correct a transaction error Glossary of Terms A ABA Routing Number This 9-digit number is assigned by the American Banker s Association and is used to identify individual banks. When performing an ACH transfer from one bank account

More information

EMV: Integrated Circuit Card Specifications for Payment Systems

EMV: Integrated Circuit Card Specifications for Payment Systems : Integrated Circuit Card Specifications for Payment Systems Jan Krhovják Faculty of Informatics, Masaryk University Jan Krhovják (FI MU) EMV (Europay, MasterCard, Visa) 20. 3. 2006 1 / 13 Outline EMV

More information

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering Network Security Gaurav Naik Gus Anderson, Philadelphia, PA Lectures on Network Security Feb 12 (Today!): Public Key Crypto, Hash Functions, Digital Signatures, and the Public Key Infrastructure Feb 14:

More information

Interoperable Mobile Payment A Requirements-Based Architecture

Interoperable Mobile Payment A Requirements-Based Architecture Interoperable Mobile Payment A Requirements-Based Architecture Dr. Manfred Männle Encorus Technologies GmbH; product management Payment Platform Summary: Existing payment methods like cash and debit/credit

More information

How To Protect A Smart Card From Being Hacked

How To Protect A Smart Card From Being Hacked Chip Terms Explained A Guide to Smart Card Terminology Contents 1 AAC Application Authentication Cryptogram AID Application Identifier Applet ARQC Authorization Request Cryptogram ARPC Authorization Response

More information

bi on Solution white paper

bi on Solution white paper bi on Solution white paper Billon Solution Overview Despite concerted efforts for years, cash has not yet been eliminated. Mostly because not everyone has a bank account and debit card - an estimated 2.5

More information