Ensuring the Safety & Security of Payments. Faster Payments Symposium August 4, 2015
|
|
- Adelia Rodgers
- 6 years ago
- Views:
Transcription
1 Ensuring the Safety & Security of Payments Faster Payments Symposium August 4, 2015
2 Problem Statement: The proliferation of live consumer account credentials Bank issues physical card Plastic at point of sale Future Ecommerce at checkout Mobile Wallet Web bill payment Mobile Apps Payment Aggregators TCH CONFIDENTIAL 2
3 Large scale data breaches brought payments security into the public consciousness 2014 was a bad year for credit card hacks, hitting companies in very different industries Reputational impact - Combined effect of several big breaches created an environment of concern for anyone holding credit cards on file Financial impact - Stolen credit card information has a real cost to issuers which is typically then borne by the entity that was hacked Consumer impact - Consumers have to update billers with new card information which can be time consuming Retailers, banks and consumers agreed that additional securities are needed TCH CONFIDENTIAL 3
4 EMV and tokenization work together to create vastly greater protections against credit card fraud EMV has been in use outside of the U.S. for decades. Tokenization is a newer concept but governed by the same organization as EMV cards, so the two efforts are cross compatible EMV Protects against card-present fraud EMV (a.k.a. chip and PIN), secures against stolen card numbers being loaded onto a fake card and then used at a retailer Cryptographic protection An EMV chip creates a dynamic cryptogram for each transaction that prevents stolen account information from being used without the presence of the correct chip Multi-factor Use of the chip (something you have), and PIN (something you know) prevents thieves from using stolen cards Tokenization Protects against card-not-present fraud- Tokenization replaces real card account numbers with different digits, protecting cards on file with different merchants Tokens have limitations on use Tokens prevent fraud by limiting their use to a single merchant or mobile wallet. Steal them and they aren t useful anywhere else Know your customer Tokens also rely on a process known as ID&V or identification and verification that validates the cardholder is involved in the creation request for a token TCH CONFIDENTIAL 4
5 Tokenization definition and attributes Tokenization Substitutes a limited-use random number (secure digital token) for customer s account numbers so that the sensitive information remains safe. Even if compromised, the token is of limited or no use to cybercriminals Token Vaults Bank (or multi-bank) vaults create tokens, perform customer authentication and provision tokens to digital wallets or directories Typical Attributes of Payment Tokens Format-preserving for legacy compatibility Either dynamic or static ; if static, may be combined with a cryptogram Restricted in scope / not general purpose Can be used live to authorize / clear transactions Token Components Consists of digits + expiration date Domain Restrictions limit the use of the token Cryptogram that is unique to each transaction TCH CONFIDENTIAL 5
6 Major tokenization use case overview DDA tokenization is part of the roadmap, as a fast follow to card based payments Mobile POS ECommerce DDA/ACH EMV Cards (potential) Mobile has been industry focus and primary use case at this time Secures mobile wallets (NFC HCE, NFC SE, QR, etc.) by using a token instead of PAN on device User experience defined by wallet provider, meeting bank ID&V and security requirements Use cases range from traditional card on file to in App User experience defined by merchant or digital wallet provider, meeting bank ID&V and security requirements Tokenized DDA account information masks transaction initiated via ACH EMV and card tokens could likely shift fraud to ACH Increased usage of ACH for one-time payments (POS, WEB) highlights risks of misuse Reduce breach risk of mass account on file databases Chip on EMV card stores token instead of PAN Enables fully tokenized POS transactions, addressing retailer breach concerns EMVCo evaluating opportunity Assessment of residual risk post EMV rollout to determine attractiveness TCH CONFIDENTIAL 6
7 Secure Token Exchange replaces live credentials with digital tokens consistent with the EMVCo framework Consumer Payment with Token Merchant Acquirer Card Networks Bank Issuer mw *token / account exchange ID&V ew Customer Authentication (ID&V) Token Provisioning) Token Service Provider Token Vault No access to customer bank account information Access to customer bank account information TCH CONFIDENTIAL 7
8 Tokenization benefits all parties in the eco-system Today With Tokenization Sensitive account information is static Customers provide live bank data to retailers, wallets, alternative payment providers, aggregators, others Fraud risk increasing as cards upgrade to EMV, and as e-commerce and mobile grow Confusing and complicated process to maintain and update consumer information across multiple providers when a card is lost, stolen or expired Customer bank data securely held behind bank firewalls Consumers don t need to provide sensitive information to multiple providers Lower fraud potential in event of data breach or lost/stolen device Single contact point to update and maintain consumer information No change in consumer behavior at POS U.S. has opportunity to lead the world by rolling out tokenization in conjunction with EMV to protect against card present and card not present fraud TCH CONFIDENTIAL 8
9 Six Safety & Soundness Principles guide TCH token efforts 1. OPEN: Allows for different business models Fosters innovation Ensures competition among market participants (e.g., vaulting) 4. STANDARDS-BASED: Establishes clearly defined standards Aligns with regulatory environment and avoids overlap with existing standards Considers and respects int'l standards as a means of facilitating interoperability 2. SAFE & SECURE: Protects confidential personal, financial, and transactional information within the mobile and e-commerce payments ecosystem Facilitates secure interactions 5. SUSTAINABLE: Creates a path forward to support long-term viability Adapts over time as technology evolves Allows for economically viable business models that accelerate adoption 3. RESPONSIVE TO END USER AND MERCHANT NEEDS: Provides for ease of use, speed, availability, security, transparency, choice and consistency for users 6. INITIAL FOCUS ON HIGH-RISK USE CASES: Mobile and e-commerce Supports exception flows, lifecycle management Supports multiple form factors (e.g., NFC, QR codes) Extension to ACH/DDA based payments TCH CONFIDENTIAL 9
10 Existing Entities New Entities Token eco-system The token ecosystem is comprised of the same general players as regular card transactions, with the additional roles of token requestor and token service provider Entity Token Vault Token Service Provider (TSP) Token Requestor Description The token vault is responsible for token creation, maintaining token-to-pan mapping, and performing detokenization The token service provider is the all-encompassing term that includes the functions of the token vault, but also provides application of security controls, provisioning, lifecycle management, and token requester registry services Entity that requests to receive a token instead of using and storing real account data for payments. Can be digital wallets, merchants, or acquirers, payment gateways etc. on behalf of merchants Cardholder Card Issuer Merchant Acquirer Payment Network Issuer Processor Initiates the creation of a token by adding their account into a tokenized environment such as a mobile wallet or token enabled e-commerce merchant Financial institution that issues the payment account. Ultimately responsible for customer authentication (ID&V) and token issuance either through their own TSP or a 3 rd party. Can act as a token requestor (e.g., card-on-file e-commerce) or simply as a recipient of a token based transaction (e.g., Apple Pay) Acquirers process all transactions as they do today including authorization, capture, clearing and exception processing. Additional fields are required for token conveyance Continue to facilitate authorization and settlement, and provide optional vault and TSP services to issuers Receive additional token related fields from payment network, call-out to TSP for detokenization, and perform ID&V on behalf of issuers TCH CONFIDENTIAL 10
11 Key token related components Tokenization uses several unique terms that are important to understand Terminology Cryptogram Domain Restriction Identification & Verification (ID&V) Token Assurance Level Definition A transaction unique value that is generated via an algorithm using transactional information and cryptographic keys. The cryptogram is generated by the token requestor and verified by the token service provider. The algorithm used is defined by respective card networks A set of parameters established as part of token issuance that limits token usage to a specific wallet, entry mode/channel, merchant, merchant category, and/or dollar limits and velocity of transactions. Method(s) used for issuers to authenticate the end-user (e.g., fingerprint on device, challenge questions, password entry etc.) A value between 0-99 assigned by the TSP using issuer specified rules that conveys the level of confidence in the customer authentication performed during token provisioning, reflecting the type of ID&V that was performed and who performed it. TCH CONFIDENTIAL 11
12 Secure Token Exchange walk-through Token Definition Token Data Flow Token Management Infrastructure BIN Digits Check Digit Determines token format, additional security layers and new token transaction fields Includes both provisioning and transactional data flows which need new messages between entities The token vault and TSP are designed to comply with the specs from previous two stages Token Exchanges PAN and expiration date for format preserving digital numbers unseen by the consumer Cryptogram Contains an algorithm that adds a dynamic component to the token and makes the token useless without proper keys Provisioning Flow Token request messages between wallet/merchant and TSP ID&V level of assurance that request is valid Token delivery messages to load token into wallet Transaction Flow Cryptogram created at time of purchase Detokenization request by network Primary Functions Account (PAN) to token mapping Provisioning management Lifecycle management Domain Control Cryptogram Validation Check Eligibility ID&V TCH CONFIDENTIAL 12
13 Token PAN Token cryptogram characteristics Token Characteristics Cryptogram Characteristics BIN Digits Check Digit Format preserving 16 digits for Visa and MasterCard, works with existing systems without modification Required Fields Token PAN Token Expiration (which can be different from the PAN expiration) Token BIN Tokens are issued from special BINs which identify the presence of a token to all parties. The token BIN contains all of the attributes of the original PAN: e.g., begins with 4 for Visa, 5 for MasterCard, indicates debit vs. credit, routing instructions etc. Due to BIN exhaustion, networks have subdivided some BINs changing the structure from to with eight digits representing the token BIN range instead of 6 Cryptogram is a transaction-unique value calculated at time of purchase; designed to validate authorized use of token Crypto Keys Each network can establish a proprietary cryptographic algorithm that uses different transactional information and requires corresponding keys Dynamic Component If the token itself remains static, then the cryptogram adds the dynamic component that dissuades fraud EMV Compatible Cryptograms used for mobile payments use rules very similar to cryptograms used in EMV card transactions Use case specific Cryptograms are not used in every token use case, such as lower risk use cases TCH CONFIDENTIAL 13
14 Secure Token Exchange provisioning Provisioning When consumers sign up for a digital wallet directly, this generates a token request that must be validated by the Issuer before a token can be used 1 PAN, Exp. Date, CVV 1 6 Token Requestor 2 3 Token Requestor ID PAN, Exp. Date, CVV Token Assurance Data Requested TAL (O) 5 6 STE Token (if approved or pending) Eligibility Status Token Assurance Level Additional ID&V Method (if applicable) Card Art + Description Terms and Conditions Token Requestor ID PAN, Exp. Date, CVV Token Assurance Data Requested TAL (O) 4 Issuer / Processor Eligibility Status Additional ID&V (if applicable) Possible Eligibility Statuses: Approved The token is provided to the Token Requestor in an active state Pending The token is sent to the Token Requestor, but is inactive until the cardholder takes additional verification steps Denied A token is not returned to the Token Requestor and the cardholder is informed to contact their financial institution for more information (O) Legend Request Response Optional Fields TCH CONFIDENTIAL 14
15 Secure Token Exchange provisioning Additional Verification Provisioning Issuers can use different methods of additional ID&V including out of band authentication, banking application or number to resolve a pending yellow-path token Token Requestor STE Out of Band Authentication: 1. Consumer selects SMS, or other out of band method to provide additional verification 2. Token Requestor informs STE which option was chosen 3. STE generates a verification code and sends to device or (alternatively, issuer can generate code and send to device) 4. Consumer enters code 5. Token Requestor passes along entered code 6. STE validates code entry and sends Token Requestor confirmation or denial 7. Token Requestor sends device approval messages or additional steps for consumer to contact Issuer 1 Bank Application/ Call Center -or- Bank Application/ Call Center 2 STE 3 Token Requestor Banking Application/Call Center 1. Consumer selects bank application or number to provide additional verification 2. Banking App or Call Center informs STE the outcome of the verification challenge 3. STE informs Digital Wallet if the token is approved or denied 4. Token Requestor moves token to live status if approved 4 TCH CONFIDENTIAL 15
16 Secure Token Exchange payment transaction flow: Mobile point-of-sale, Pass-Through model Net new token fields are shown, all other data is passed as usual Transactions Token ** Token Exp. Date ** Token Requestor ID*** Token Cryptogram ** Token ** Token Exp. Date ** Token Requestor ID (O)*** Token Cryptogram ** POS Entry Mode * * ** *** (O) Mobile Wallet Legend Payment 4 Merchant Acquirer Network 7 Auth Request Auth Response BAU Data Fields Token Data in Current Fields New Data Fields Optional Fields Issuer / Processor Token ** Token ** Token Assurance Level *** Token Assurance Level *** Last 4 digits of PAN*** PAN Product ID (O) ** Last 4 digits of PAN*** Token ** Token Requestor ID (O) *** POS Entry Mode PAN* Token Assurance Level *** PAN Product ID (O) ** 5 6 STE Token ** Token Exp. Date ** Token Requestor ID*** POS Entry Mode PAN* PAN Exp. Date * Token Assurance Data (O) *** Token Assurance Level *** TCH CONFIDENTIAL 16
17 Lifecycle Management Functions Transactions Issuer tokens allow for several important lifecycle management functions Cardholder Initiated: Suspend Resume Delete STE Issuer Initiated: Suspend Resume Delete Update Transaction History Functions Suspend Resume Delete Update Transaction History (optional) Definition A request to freeze the tokens in the digital wallet, e.g., mobile device is lost The freeze placed on tokens by a suspend request is lifted and tokens are once again live. A resume request can only be issued by the party who originally suspended the token Tokens can be removed from the wallet at any time by a request for deletion An Issuer request to update various fields associated with a token, including, expiration date of token or PAN, change to underlying PAN, domain restriction change, change to attributes of PAN, token assurance level, or a change to the last four digits of PAN Provides information on past purchases to the digital wallet. Contains location, date, amount and merchant information TCH CONFIDENTIAL 17
18 The DDA Token working group is focusing on adapting card token standards into a tokenization solution for DDA-based transactions, beginning with ACH payments Workshop Deliverables Generate a DDA Token framework to include: DDA token scope and definition Corresponding data elements Flows for provisioning, transactions and lifecycle management Guiding Principles DDA Tokenization applies to both current ACH as well Same-Day and/or Real-Time transactions Consistency with mobile/card tokenization, with differences to account for new requirements and use cases for ACH Minimize change to ACH formats and processing flows Support for merchant / digital wallet use cases where both card and ACH tender options are tokenized Follow-on efforts Generate an industry business case to evaluate the opportunity Evaluate potential NACHA rule changes needed to support token formats and drive ubiquity Engagement with the Federal Reserve RPO to generate alignment Develop a timeline for implementation TCH CONFIDENTIAL 18
TOKENIZATION: THE FUTURE OF ACCOUNT NUMBERS. Steve Ledford The Clearing House
TOKENIZATION: THE FUTURE OF ACCOUNT NUMBERS Steve Ledford The Clearing House Problem Statement: The proliferation of live account credentials creates huge risks Bank issues physical card Plastic at point
More informationQuick Guide. Token Service Provider
Quick Guide Token Service Provider 1 Introduction to Mobile Payments The mobile payments revolution is here! Driven by the development of near field communication (NFC) enabled smartphones, the launch
More informationTokens, Tokens, Tokens: What are the different kinds of tokens and what do they do?
Tokens, Tokens, Tokens: What are the different kinds of tokens and what do they do? Lanny Byers, VP Emerging Payment Solutions February 25, 2019/3:30PM/Grand Ballroom J-K The way consumers buy has changed
More informationTokenization: The Future of Payments
Tokenization: The Future of Payments Security? Background The Payment Card Industry Data Security Standard (PCI-DSS) was created to increase controls around cardholder data to reduce credit card fraud
More informationTokenization: What, Why and How
Tokenization: What, Why and How 11/5/2015 UL Transaction Security 2011 Underwriters Laboratories Inc. We have EMV why do we need tokenization? From Magstripe Merchant Signature Issuer Magstripe Risk Management
More informationThe Evolution of Payment Specifications and Tokenization. Smart Card Alliance and EMVCo Webinar November 4, 2015
The Evolution of Payment Specifications and Tokenization Smart Card Alliance and EMVCo Webinar November 4, 2015 Presenters and Agenda Tokenization as a Layered Security Approach for Secure Payments Randy
More informationIn this Document: EMV Payment Tokenisation Payment Account Reference (PAR) FAQ EMV Payment Tokenisation Technical FAQ
In this Document: EMV Payment Tokenisation General FAQ EMV Payment Tokenisation Payment Account Reference (PAR) FAQ EMV Payment Tokenisation Technical FAQ EMV Payment Tokenisation General FAQ 1. What is
More informationQuick Guide. Token Service Provider
Quick Guide Token Service Provider Introduction to Mobile Payments The mobile payments revolution is here! Driven by the development of near field communication (NFC) enabled smartphones, the launch of
More informationApple Pay and Tokenization Background and Overview
A Euronet Software Solutions White Paper Apple Pay and Tokenization Background and Overview By Stephen Butcher Euronet Software Solutions Product Manager Cards and Networks November 2014 2014 Euronet Software
More informationBest Practices For Tokenization Projects In The Payments Industry
Best Practices For Tokenization Projects In The Payments Industry The Payment Industry s Move To Tokenization While EMV is effective for securing card transactions at point-of-sale terminals, it is less
More informationTokenization April Tokenization. Gregory H. Soule, CPA, CISA, CISSP, CFE Senior Manager. Andrews Hooper Pavlik PLC
ization Gregory H. Soule, CPA, CISA, CISSP, CFE Senior Manager Andrews Hooper Pavlik PLC 1 Agenda and Implementation EMV, Encryption, ization Apple Pay Google Wallet Recent Trends Resources Agenda and
More informationMobile and Contactless Payments Requirements and Interactions
Mobile and Contactless Payments Requirements and Interactions Version 1.0 Date: February 2018 2018 U.S. Payments Forum and Smart Card Alliance. All rights reserved. Page 1 About the U.S. Payments Forum
More informationEMV Chip Cards. Table of Contents GENERAL BACKGROUND GENERAL FAQ FREQUENTLY ASKED QUESTIONS GENERAL BACKGROUND...1 GENERAL FAQ MERCHANT FAQ...
EMV Chip Cards FREQUENTLY ASKED QUESTIONS Table of Contents GENERAL BACKGROUND...1 GENERAL FAQ...1 4 MERCHANT FAQ...5 PROCESSOR/ATM PROCESSOR FAQ... 6 ISSUER FAQ... 6 U.S.-SPECIFIC FAQ...7 8 GENERAL BACKGROUND
More informationHCE Driving NFC: From Idea to Reality to Ubiquity. Mobey Day October 7/8, 2014
HCE Driving NFC: From Idea to Reality to Ubiquity Mobey Day October 7/8, 2014 M-PAYMENTS & NFC ADOPTION? 2 WHY SO SLOW? The trend towards mobile has set in everywhere else Contactless card use and acceptance
More informationEMV and Apple Pay. The world of credit cards is on the move.
EMV and Apple Pay The world of credit cards is on the move. Today we will talk about The basics of EMV and Apple Pay. There are a lot of details we could get lost in. This is a high-level overview. We
More informationEMV Adoption in the U.S.
EMV Adoption in the U.S. What you need to know about the outcome of EMV adoption in other countries and the implications for adoption in the U.S. Table of Contents Introduction [3] What is EMV? [4] The
More informationEMV Migration Updates and Next Steps
EMV Migration Updates and Next Steps Michael Carrick, US Business Development Thursday February 16, 2017 1:00 1:35 Agenda ACCEO Tender Retail Who We Are EMV Quick Facts EMV Adoption Rates EMV is a Four
More informationThe Future of Payment Security in Canada
The Future of Payment Security in Canada October 2017 1 Visa Canada Public The Future of Payment Security in Canada Notices Forward-Looking Statements This presentation contains forward-looking statements
More informationEMV THE DEFINITIVE GUIDE FOR US MERCHANTS AND POS RESELLERS
EMV THE DEFINITIVE GUIDE FOR US MERCHANTS AND POS RESELLERS WHAT IS EMV EMV is a global standard for credit and debit card processing designed to replace magnetic stripe cards. Also referred to as chip
More informationHow Safe Are Mobile Payments? MAC Webinar
How Safe Are Mobile Payments? MAC Webinar March 16, 2017 Dave Lott Payments Risk Expert Federal Reserve Bank of Atlanta The views expressed in this presentation are those of the presenters and do not necessarily
More informationEMV Implementation Guide
iqmetrix Payment Processing 12/18/2014 EMV Implementation Guide 1-866-iQmetrix www.iqmetrix.com Table of Contents 1. Introduction... 2 2. What is EMV?... 2 3. How is a chip card different?... 2 4. How
More informationADDING VALUE TO SECURITY. How Issuers Can Leverage Tokenization to Capture New Revenue-Generating Opportunities. firstdata.com
A First Data Position Paper ADDING VALUE TO SECURITY How Issuers Can Leverage Tokenization to Capture New Revenue-Generating Opportunities firstdata.com Introduction The payments world is undergoing a
More informationSecuring Our Future Growth Gord Jamieson Visa North America Risk Services. Visa Public
Securing Our Future Growth Gord Jamieson Visa North America Risk Services Visa Public Copyright and Third Party Mark Notice Copyright Notice Visa 2014. All rights reserved. This material may not be distributed
More informationThe Evolution of Payment Specifications and Tokenization. Smart Card Alliance and EMVCo Webinar October 1, 2015
The Evolution of Payment Specifications and Tokenization Smart Card Alliance and EMVCo Webinar October 1, 2015 Presenters and Agenda U.S. Market Progress Randy Vanderhoof Executive Director Smart Card
More informationEMV Migration Forum. How EMV Significantly Lessens the Impacts of Data Breaches. David Worthington, Principal Consultant// 12th March 2014
EMV Migration Forum How EMV Significantly Lessens the Impacts of Data Breaches David Worthington, Principal Consultant// 12th March 2014 Agenda In the Beginning and then came The Business Basics What Merchants
More informationEMV: Strengthen Your Business Through Secure Payments
PRODUCT CAPABILITY GUIDE EMV Chip Cards Payments EMV Chip Cards Payments EMV: Strengthen Your Business Through Secure Payments As EMV chip-based technology gains coverage around the world, it gets easier
More informationAndreas Strobel SPA Board Member shaping the future of payment technology
A Secure Profile for Tokenization in E and M-Commerce Andreas Strobel SPA Board Member Who we are The Smart Payment Association addresses the challenges of today s evolving payment ecosystem. We offer
More informationBeyond Tokenization Ensuring secure mobile payments using dynamic issuance with on-device security and management
Beyond Tokenization Ensuring secure mobile payments using dynamic issuance with on-device security and management WHITE PAPER Introduction Cloud-based payments powered by tokenization represent a paradigm
More informationChanging Consumer Purchasing Patterns
Changing Consumer Purchasing Patterns John Mayleben, CPP SVP, Technology and Product Development Retailers Processing Network Michigan Retailers Association Retailers Processing Network & Michigan Retailers
More informationSTAR Network Overview
STAR Network Overview Presented by: Jeff Jakopec, Sr. Strategy Business Development September 26, 2017 What Differentiates STAR Network From the Rest STAR provides market leading fraud solutions that help
More informationNetSuite Integration for CyberSource. Getting Started Guide
NetSuite Integration for CyberSource Getting Started Guide December 2017 Contents Introduction... 3 Configure Your CyberSource Account... 3 Configure Your NetSuite Account... 5 Add a New CyberSource Credit
More informationEMV Terminology Guide
To make life easier, TMG has compiled some of the most commonly used EMV terms in this guide. If you have questions about EMV, contact your Director of Client Relations directly or email clientrelations@themebersgroup.com.
More informationHCE E-Book HOST CARD EMULATION: NFC S MISSING LINK
HCE E-Book HOST CARD EMULATION: NFC S MISSING LINK HOST CARD EMULATION: NFC S MISSING LINK Contents Executive Summary 3 1. What is HCE? 5 2. Implementation options 11 3. HCE & security: tokenization 12
More informationSecure Remote Payment Council (SRPc) White Paper Discussion: EMV Enhancements Post Implementation September 13, 2016
Secure Remote Payment Council (SRPc) White Paper Discussion: EMV Enhancements Post Implementation September 13, 2016 Objective This white paper is the fifth in the series developed by the Secure Remote
More informationAgenda. What is EMV. Chip vs Mag Stripe. Benefits of EMV. Timeframes & Liability Shift. Costs. Things to consider. Questions
EMV Chip Cards Agenda What is EMV Chip vs Mag Stripe Benefits of EMV Timeframes & Liability Shift Costs Things to consider Questions 2 What is EMV EMV was named for the developers Europay, MasterCard and
More informationEMV and Educational Institutions:
October 2014 EMV and Educational Institutions: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks,
More informationProxama PIN Manager. Bringing PIN handling into the 21 st Century
Proxama PIN Manager Bringing PIN handling into the 21 st Century I am not a number I am a free man So said the The Prisoner in that 1960s cult TV show, but Personal Identification Number, or PIN, was adopted
More informationEMV 3-D Secure Press Kit Q&A
EMV 3-D Secure Press Kit Q&A 1. What is EMV 3-D Secure? EMV Three-Domain Secure (3DS) is a messaging protocol that enables frictionless consumer authentication and the ability for consumers to authenticate
More informationTechnologies for Payment Fraud Prevention: EMV, Encryption and Tokenization
A SMART CARD ALLIANCE PAYMENTS COUNCIL WHITE PAPER Technologies for Payment Fraud Prevention: EMV, Encryption and Tokenization Publication Date: October 2014 Publication Number: PC-14002 Smart Card Alliance
More informationEMV Frequently Asked Questions for Merchants May, 2015
EMV Frequently Asked Questions for Merchants May, 2015 Copyright 2015 Vantiv, LLC. All rights reserved. *EMV is a registered trademark in the U.S. and other countries, and is an unregistered trademark
More informationIntroduction to EMV BEYOND PAYMENT
Introduction to EMV TAKING YOU TAKING YOU BEYOND PAYMENT Why EMV? Security Magstripe cards are easily reproduced EMV can verify card and user authenticity Chip & PIN Interoperability The world has moved
More informationEMV: Facts at a Glance
EMV: Facts at a Glance 1. What is EMV? EMV is an open-standard set of specifications for smart card payments and acceptance devices. The EMV specifications were developed to define a set of requirements
More informationEMV: Frequently Asked Questions for Merchants
EMV: Frequently Asked Questions for Merchants The information in this document is offered on an as is basis, without warranty of any kind, either expressed, implied or statutory, including but not limited
More informationATM Webinar Questions and Answers May, 2014
May, 2014 Debit Network Alliance LLC (DNA) is a Delaware Limited Liability Company currently comprised of 10 U.S. Debit Networks and open to all U.S. Debit Networks. The goal of this collaborative effort
More informationEMV Basics and the market
EMV Basics and the market What is a smartcard? 1 2 3 4 5 2 What is EMV? EMV is the globally adopted international standard for adding a chip on a payment card A chip is a small computer built into the
More informationFrequently Asked Questions for Merchants May, 2015
EMV Frequently Asked Questions for Merchants May, 2015 Copyright 2015 Vantiv, LLC. All rights reserved. *EMV is a registered trademark in the U.S. and other countries, and is an unregistered trademark
More informationThe Small Business Guide to Mastering EMV
The Small Business Guide to Mastering EMV EMV 101 Understanding the Basics of EMV Technology Get to Know the Chip What is EMV? Understanding EMV & the Technology that Powers EMV Cards EMV, which stands
More informationEMV 3-D Secure Press Kit Q&A
EMV 3-D Secure Press Kit Q&A 1. What is EMV 3-D Secure? EMV 3-D Secure (3DS) is a messaging protocol that promotes frictionless consumer authentication and enables consumers to authenticate themselves
More informationMerchant Considerations for U.S. Chip Migration. EMV Migration Forum/National Retail Federation September 2014
Merchant Considerations for U.S. Chip Migration EMV Migration Forum/National Retail Federation September 2014 2 About the EMV Migration Forum The EMV Migration Forum is a cross-industry body focused on
More informationMerchant Considerations for U.S. Chip Migration. EMV Migration Forum/National Retail Federation September 2014
Merchant Considerations for U.S. Chip Migration EMV Migration Forum/National Retail Federation September 2014 2 About the EMV Migration Forum The EMV Migration Forum is a cross-industry body focused on
More informationDIGITAL CREDIT for EMV QR Credit Card Apps
Digital Debit Group Official Document DIGITAL CREDIT for EMV QR Credit Card Apps Mobile SDK Specification Version 2.1 June 2017 2017 Digital Debit Group U.S., Qondado LLC managing partner. All Rights Reserved.
More informationThe Changing Landscape of Card Acceptance
The Changing Landscape of Card Acceptance Troy Byram Vice-President Sr. E-Receivables Consultant February 6, 2015 Agenda EMV (Chip and Pin) PCI Compliance and Data Security New Regulations for Municipalities
More informationIgnite Payment s Program on EMV
Ignite Payment s Program on EMV 2015 First Data Corporation. All Rights Reserved. All trademarks, service marks and trade names referenced in this material are the property of their respective owners.
More informationEMV FAQ S FROM A MERCHANT S PERSPECTIVE
EMV FAQ S FROM A MERCHANT S PERSPECTIVE WHAT IS EMV? EMV, or Europay MasterCard Visa, is a fraudreducing technology that can help protect issuers, merchants and consumers against losses from the use of
More informationCards on the table! Bernd Filsinger Payment Technology Services Lead Client Support Services, Europe region
Cards on the table! Bernd Filsinger Payment Technology Services Lead Client Support Services, Europe region Notice of confidentiality This presentation is furnished to you solely in your capacity as a
More informationECSG (Vol Ref. 8.A01.00) SEPA CARDS STANDARDISATION (SCS) VOLUME. Payments and Cash Withdrawals with Cards in SEPA
ECSG001-17 01.03.2017 (Vol Ref. 8.A01.00) SEPA CARDS STANDARDISATION (SCS) VOLUME STANDARDS REQUIREMENTS ANNEX 01 SEPA CARDS TRANSACTION FLOWS Payments and Cash Withdrawals with Cards in SEPA Applicable
More informationTokenization. Transformation to digital payments
Tokenization Transformation to digital payments About MeaWallet MeaWallet is a Norwegian company that was established in 2013. MeaWallet is the centre of excellence within mobile and digital payments and
More informationEMV: GET READY. Michelle Thornton, CO-OP Financial Services
EMV: GET READY Michelle Thornton, CO-OP Financial Services EMV Technology EMV and Chip Used Interchangeably In essence it replaces the functionality of magstripe with a computer chip making it nearly impossible
More informationVisa s Future of Security Roadmap: Australia
Visa s Future of Security : Australia Contents Executive Summary 3-Domain Secure 2.0 Biometrics Tokenisation EMV Chip Technology Expanding Mobile Acceptance Mobile Geo-location Transaction Controls and
More informationTechnology Developments in Card-Based Payments WACHA Payments 2013
Technology Developments in Card-Based Payments WACHA Payments 2013 April 9, 2013 The information contained on these slides is considered the Confidential & Proprietary Information of Two Sparrows Consulting,
More informationCovering Your Assets: Payment Landscape and Technology
Covering Your Assets: Payment Landscape and Technology Keith Lam Sr. Product Manager 2016 Epicor Software Corporation Keith Lam Senior Product Manager 9+ years at Epicor, focusing on building great products
More informationEMV Cards - Chipping Away at Fraud
EMV Cards - Chipping Away at Fraud Bill Kniering Director, Commercial Card Client Management MUFG Union Bank, N.A. A member of MUFG, a global financial group 2015 Mitsubishi UFJ Financial Group, Inc. All
More informationSecuring Card Payments Challenges & Opportunities. Julie Hanson Senior Vice President, Card & Payment Products ICBA Bancard & TCM Bank, NA
Securing Card Payments Challenges & Opportunities Julie Hanson Senior Vice President, Card & Payment Products ICBA Bancard & TCM Bank, NA Agenda Securing Payments Landscape Chip Technology Tokenization
More informationEMV Secure Remote Commerce. Frequently Asked Questions (FAQ)
EMV Secure Remote Commerce Frequently Asked Questions (FAQ) 1. What is EMV * Secure Remote Commerce? EMV Secure Remote Commerce (SRC) offers an approach to promote security and interoperability within
More informationMinimizing the Impact of EMV & Churn on Your Subscription Business
Minimizing the Impact of EMV & Churn on Your Subscription Business Powering Subscription Success The Impact of EMV Technology If you re a merchant in particular, if your business is primarily online and
More informationChargeback Best Practices. September 7, 2016
1 Chargeback Best Practices September 7, 2016 22 U.S. Payments Forum the cross-industry body focused on supporting the introduction and implementation of EMV and other new and emerging technologies that
More informationVARTECH NATION. EMV Certification for IT Professionals
The modern credit card is an American invention but in the twenty-first century, Europe has led the way in credit card technology. The first smart cards, equipped with their own computer chips, showed
More informationAt a Glance: The Payment Ecosystem. Powering Subscription Success
At a Glance: The Payment Ecosystem Powering Subscription Success Elements of a Payment Ecosystem Payment ecosystems is a term that typically evokes complexity and confusion among novices and professionals
More informationEMV Validation (on-behalf of) Service
PRODUCT CAPABILITY GUIDE EMV Validation (on-behalf of) Service EMV Validation (on-behalf of) Service Provide Issuers with the Ability to Implement EMV Quickly and Easily A global security standard for
More informationPinless Transaction Clarifications
Pinless Transaction Clarifications April, 2017 Agenda Definition Level Set Application Selection Overview and Scenario Explanation EMV No CVM PIN Bypass Debit Expansion Programs PINless POS Product Signature
More informationIs Your Organization Ready for the EMV Challenge?
Is Your Organization Ready for the EMV Challenge? Suzanne Galvin Director of Product Management Elan Financial Services Jeff Green Director of the Emerging Technologies Advisory Service Mercator Advisory
More informationSee Your Customers, Not Payment
See Your Customers, Not Payment Types, with PAR Joseph Koenig (Index) Thursday, March 1, 2018 @ 4:30PM Agenda Everything you wanted to know about PAR: What is a PAR? Why was PAR created? Where can PAR
More informationAconite Smart Solutions
Aconite Smart Solutions PIN Management Services Contents PIN MANAGEMENT... 3 CURRENT CHALLENGES... 3 ACONITE PIN MANAGER SOLUTION... 4 OVERVIEW... 4 CENTRALISED PIN VAULT... 5 CUSTOMER PIN SELF SELECT
More informationSeeds of Change in Debit
Seeds of Change in Debit The 2016 Debit Issuer Study MEDIA EXHIBITS Study Overview The Debit Issuer Study is the definitive assessment of U.S. debit market 2016 Debit Issuer Study is the 11th edition of
More informationEMV A Chip Off the New Block
EMV A Chip Off the New Block WACHA Taking Flight With Payments March 18, 2014 Paul Tomasofsky President, Two Sparrows Consulting Paul@TwoSparrowsConsulting.com (201) 930-9551 Christa Addy Product Manager,
More informationPROTECT AGAINST A DATA BREACH & ADDRESS PCI DSS COMPLIANCE WITH TRUSTCOMMERCE
WHITE PAPER PROTECT AGAINST A DATA BREACH & ADDRESS PCI DSS COMPLIANCE WITH TRUSTCOMMERCE p 800.915.1680 www.trustcommerce.com 2016 TrustCommerce. All Rights Reserved. No part of this document may be distributed,
More informationEMV is coming. Here s how to stay ahead of the trend. Presented by CO-OP Financial Services
EMV is coming. Here s how to stay ahead of the trend. Presented by CO-OP Financial Services October 25, 2012 Agenda What EMV is and how it works U.S. and global adoption Impact to the payments ecosystem
More informationEMV for Merchants and Merchant Acquirers: U.S. Migration Considerations. Smart Card Alliance Webinar October 6, 2011
EMV for Merchants and Merchant Acquirers: U.S. Migration Considerations Smart Card Alliance Webinar October 6, 2011 Introductions Randy Vanderhoof Executive Director -- Smart Card Alliance 2 Who We Are
More informationCrash Course: What are EMV and the EMV Liability Shift?
Are You EMV Ready? Are You EMV Ready? In the months leading up to October, 2015, the EMV liability shift and the details surrounding it have been the talk of the retail and hospitality industries. A significant
More informationFinding the Best Route for EMV in the US
Finding the Best Route for EMV in the US 1/23/2013 Exploring EMV Implementation Strategies that Preserve Network Routing Options and Satisfy Government Regulations ABSTRACT Recently the Debit Working Committee
More informationIntroduction to Faster Payments in the U.S. REGIONAL PAYMENTS ASSOCIATIONS
Introduction to Faster Payments in the U.S. REGIONAL PAYMENTS ASSOCIATIONS April 2017 The industry is taking bold steps to create faster, secure solutions for a variety of payments needs. New capabilities
More informationDates Visa MasterCard Discover American Express. Acquirers, subprocessors. support EMV. International ATM liability shift 2
Network Updates Winter 2015 We are committed to working closely with you on achieving your business goals. As a part of this commitment, we carefully monitor Network changes and summarize them for your
More informationWinter 2019 Network Updates. Webinar Presentation January 29, 2019
Winter 2019 Network Updates Webinar Presentation January 29, 2019 ALL BRANDS 2 [UPDATE/REMINDER] Return Authorization Requirements, All Brands Visa, Discover, and Mastercard will require acquirers and
More informationMITIGATE THE RISK OF FRAUD AND COMPLIANCE COSTS with EMV mandates. An NCR white paper
MITIGATE THE RISK OF FRAUD AND COMPLIANCE COSTS with EMV mandates An NCR white paper Don t let your aging ATM network put you at risk of non-compliance and the threat of liability for fraudulent transactions.
More informationPayment Card Industry Data Security Standard Self-Assessment Questionnaire B Guide
Payment Card Industry Data Security Standard Self-Assessment Questionnaire B Guide Prepared for: University of Tennessee Merchants 12 May 2015 Prepared by: University of Tennessee System Administration
More informationTAS CASHLESS 3.0 FOCUS ON. The absolute framework for electronic payment management. CASHLESS 3.0: the ultimate. payment experience
TAS CASHLESS 3.0 The absolute framework for electronic payment management CASHLESS 3.0: the ultimate payment experience CASHLESS 3.0 is TAS innovative processing platform that enables financial institutions,
More informationTopics. First Data and STAR Network overview. Competitive advantage. Fraud in emerging payments. Fraud innovation what s coming
Todd Clark Topics First Data and STAR Network overview Competitive advantage Fraud in emerging payments Fraud innovation what s coming 2 Introducing Todd Clark Background Entrepreneur Core Data Resources
More informationEMV 101. EMV Migration Forum Webinar March 6, 2014
EMV 101 EMV Migration Forum Webinar March 6, 2014 Introduction Randy Vanderhoof Director, EMV Migration Forum About the EMV Migration Forum Cross-industry body focused on supporting the EMV implementation
More informationWELCOME THE CHANGING LOOK OF FRAUD CURRENT FRAUD TRENDS INCLUDE:
WELCOME Reliable fraud detection capabilities are the key to defending your financial institution and your credit, debit and prepaid cardholders from today s ever-evolving fraud hazards. With the implementation
More informationMy new Apple device will have a payment feature. How do I set it up?
F S HOW IT WORKS: PPLE PY ND DIGITL CCOUNT NUMBERS My new pple device will have a payment feature. How do I set it up? Before making payment with your new pple Device you will need to follow a few simple
More informationThe Top 5 Myths About Financial Instant Issuance
The Top 5 Myths About Financial Instant Issuance FINANCIAL INSTANT ISSUANCE OR THE ABILITY TO ISSUE PERSONALIZED DEBIT AND CREDIT CARDS ON-DEMAND, IN BRANCH HAS BECOME A STAPLE OF MODERN BANKING. Yet assumptions
More informationEMV Beyond October 1, Kristi Kuehn VP, Compliance Heartland
EMV Beyond October 1, 2015 Kristi Kuehn VP, Compliance Heartland Conexxus Host Linda Toth, Director of Standards Conexxus Moderator Mark Carl, CEO EchoSat Presenter Kristi Kuehn, Vice President, Compliance
More informationX Infotech Banking. Software solutions for smart card issuance
X Infotech Banking Software solutions for smart card issuance WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for centralized and instant issuance of financial and non-financial
More informationSafeguarding Online Transactions, Reducing Fraud and Improving the Consumer Experience
Safeguarding Online Transactions, Reducing Fraud and Improving the Consumer Experience Gustavo Kok, Dafiti Group Frederico Trevisan, Santander Dennis Gamiello, Mastercard Introduction - Authentication
More informationE M V O V E R V I E W. July 2014
E M V O V E R V I E W July 2014 A G E N D A EMV Overview EMV Industry Announcements EMV Transaction Differences, What to Expect Solution Decisions Market Certification Considerations Questions 2 E M V
More informationPayeezy.com Security in Apple Pay In-App Development
Payeezy.com Security in Apple Pay In-App Development TM Unlike wallets of the past that saw weak consumer engagement, demand for Apple Pay is being driven directly by consumers. Today, developers are seeing
More informationHeartland Payment Systems
Heartland Payment Systems Publicly traded on the NYSE: HPY FORTUNE 1000 company Processes more than 11 million transactions a day Serves over 250,000 business locations nationwide Over 3,000 employees
More informationA CryptoCodex Ltd. Product
A CryptoCodex Ltd. Product The Pitch QRedit is a Credit Card Cyber Security Solution that is designed to allow consumers to quickly and securely shop online and on social media sites, even on an infected
More informationCard Technology. November 6, 2017 / Jennifer Baur, Conduent & Jamie Topolski, Fiserv
Card Technology November 6, 2017 / Jennifer Baur, Conduent & Jamie Topolski, Fiserv 1 Recent USAToday Headline: Wisconsin company to install rice-sized microchips in employees 1 Welcome to the future?
More informationTop 5 Facts Merchants Need To Know About EMV
Top 5 Facts Merchants Need To Know About EMV June, 2015 Lindsay Breathitt, Product Marketing Steve Cole, Product Management Why EMV, Why Now Agenda U.S. market update EMV Top 5 EMV facts Understanding
More information