Beyond Tokenization Ensuring secure mobile payments using dynamic issuance with on-device security and management

Size: px
Start display at page:

Download "Beyond Tokenization Ensuring secure mobile payments using dynamic issuance with on-device security and management"

Transcription

1 Beyond Tokenization Ensuring secure mobile payments using dynamic issuance with on-device security and management WHITE PAPER

2 Introduction Cloud-based payments powered by tokenization represent a paradigm shift in the way the payments industry enables secure payments and manages risk Bottom line: Tokens issued to phone memory must be protected by robust on-device software and dynamic management of card data by network-based software. across multiple mobile platforms and access points. Top industry players see major opportunities presented by new flexible implementations of mobile payments. The most notable of these is Host Card Emulation (HCE), which not reliant on scarce and controlled resources of security hardware on smartphones. However, the new avenues open for cloud and software-based mobile payments are not without risk. This white paper presents important security considerations for card issuers intending to provision cloud-based payment credentials to mobile devices. Sequent sees the provisioning of cloud-based payment credentials to mobile devices in three distinct parts: tokenization, dynamic issuance, and on-device security and management. The lack of secure element hardware storage in the handset creates the need for strong software based solutions to mitigate the risk of storing sensitive card data on phone memory. Tokenization has emerged as one of the most important solutions for enabling secure cloud-based payments. By replacing something of high value, the secure Personal Account Number (PAN), with something of lower value, the limited-time use card data or token, tokenization protects the original PAN number from misuse. Tokenization specifications being implemented in commercial services today provision tokens to phones with extended active life spans - opening the window for potential fraud. The issue is that tokenization alone is not enough to enable secure mobile payments. Per EMVCo s specification on tokenization, a token is defined as an alternate PAN, which is not the same as strict limited-time use data. Consequently, tokenization specifications being implemented in commercial services today provision tokens to phones with extended active life spans - opening the window for potential fraud. Hence the role of tokenization in cloud-based payment security for proximity payment has lesser importance than it is often given. 2

3 Service providers are generally familiar with the aspects of card issuance and personalization. Card issuance and personalization for SE-based and HCE-based issuance have much in common. The key difference being that the former is static while the latter is dynamic in nature. Dynamic issuance requires dynamic management of the card and account data in addition to tokenization. The dynamic management of mobile issuance coupled with on-device security and management is what ensures the security of tokens sent to mobile devices. Here are some of the issues that arise with HCE cloud-based mobile payments: How is the user device authenticated? How is data secured on the device? How is the integrity of the application ensured? How is the card data secured in transit to the mobile app? How is the user experience managed when multiple applications are registered as payment Making sure that mobile cards are safe to use is a primary concern of bank risk management departments. They need to continually evaluate the security management aspect of the card data. How secure is the card data? When was it last replenished? What has changed since then? As stated earlier, it is a misperception that tokenization alone provides the necessary security and risk management that banks need. Who ensures that the card data is not spoofed from one device and replayed on another device? In truth, a token is not enough to replace the security of a secure element. What happens after the service is active on the device receives less attention although it is of equal or greater importance. After all, consumers care little about how the card is provisioned to their mobile wallet. But they do care about how convenient and safe it is to use a card. This paper describes in detail the distribution and management challenges that need to be addressed for successful rollout of cloud-based mobile payments. in Android apps? Who manages the seamless payment experience for the consumer who is unaware where card data is stored or if data network is available or not? Who provides active account management policies that govern the usage of card data on device? Who provides active monitoring of the card data (e.g. tracking geolocation) for purposes of active account management? Tokens issued to phone memory must be protected by robust on-device software and dynamic management of card data by network based software. 3

4 Cloud-based Payment Solution Overview To understand where the issues lay, let us take a look at how cloud-based payments are currently deployed. The high-level components of a cloud-based payment solution are tokenization (alternate PAN), digital issuance, app management, and an on-device HCE client. The tokenization system provides the token vault, token generation, and token validation services. The digital issuance system manages the cloud-based card account, associated keys, and provides business logic for card data provisioning and replenishment. The app management system is responsible for managing millions of mobile endpoints and acts as a conduit for secure card data to the device. The HCE client software protects the card data on-device. For a complete security solution, the following functions are critical: Application integrity. The application must be protected so it cannot be manipulated by a hacker. On-Device Management Authentication of device, user, and service. Securing card data and cryptographic functions. Card data, the keys and the cryptographic functions must be protected so they cannot be stolen and replayed from another device. Securing communication to the device. Although this can be implemented between the digital issuance system and the on-device middleware, it is not the job of digital issuance to manage the device endpoints and the security requirements associated with them. Capture on-device telemetry data that are essential for risk management for cloud-payment. The system would notify the digital issuance system when there is change in the device, geolocation, and mobile phone number. Dynamic Management Digital Issuance Bank digital wallet or mbanking app App Management Account data management Key management Banking App On-Device SW Authentication Secure communication Device & app management Event management Active account management Card lifecycle management Token Service Provider Issuance On-device software that manages security of bank cards, generates transaction data, including cryptogram Manages application security, device and app authentication, registration, and device/app lifecycle Token vault Token generation Token validation Figure 1 shows a system view of the overall cloud-based payment solution. 4

5 Digital Issuance There are two aspects to issuance of cloud-based credentials. The first is the card data (track 1 and track 2 data) and the associated keys. Digital issuance is responsible for communicating with bank systems to receive card data and keys, and preparing data based on the required format. It is also responsible for managing the lifecycle of the card data on device, which includes add, delete, suspend, and resume actions. Just like SE-based issuance, issuance in a cloud-based payment system must interface with bank systems, prepare card data for the device, and manage Tokenization Second aspect is the replacement of the PAN with a token; a process known as tokenization. The digital issuance system requests the token from the token service provider (TSP) and sends it to the phone during issuance. As part of the issuance process, the TSP s function is relatively small. It needs to validate the requestor (digital issuance system) and perform relevant ID&V (identification and validation) checks. The TSP plays a bigger role in transaction processing where it must validate the token and map it back to the PAN for every transaction. keys that need to be sent to the phone. It is important to note that there is no significant difference in data preparation between card data prepared for SE-based issuance versus HCE-based issuance. The additional role that HCE-based digital issuance systems play is active account management. Tokenization has become the primary topic in HCE security discussions but it is actually only one part of the security in HCE payments. Tokenization as implemented is not about restricting the lifetime or usage count of the token. Tokenization obscures the card data elements that are susceptible to compromise (PAN and its expiry date) from the weakest points in the payment processing ecosystem by using alternate data elements (alternate PAN and its expiry date) and restricting usage to specific domains such as ecommerce payment or NFC payment. The great strength of HCE cloud payments is linked to dynamic data, while the nature of security provided by tokenization is static. In a world of connected and always on devices, static security is not enough. Security needs to be dynamic and continuously validated. 5

6 Application Management System While the digital issuance system is responsible for prepping card data and requesting tokens from the TSP, it is the responsibility of the application management system to handle distribution to devices. The app management system manages the last mile; ensuring device and user authentication, securing communications with the devices, and finally sending the sensitive card data. On-device software must: Accommodate all secure storage methods: SE, TEE, and HCE Protect card data, keys and cryptographic functions Resist modification by hackers so that no harmful code can be injected in the application Be the single point of trust between cards, mobile apps and backend systems Extend existing authentication and authorization to potentially multiple HCE apps Provide an abstraction layer to manage new capabilities and future security layers without interfering with the user experience Support all payment networks In terms of secure distribution of sensitive data, there are two sources of trust the user and the backend. The security architecture must assume that this channel is fundamentally unsecured. The trust established for the on-device software is temporarily in nature. Since a mobile device is fundamentally unsecure, this trust has to be rotated regularly. It is the responsibility of the app management platform to manage this trust along with the associated business rules for distribution. This can become increasingly complex if multiple payment apps coexist on the same device. When account parameters are provisioned to the device, the On-device Software: Secure Storage and More The future of mobile payments demands that on-device software take on even more roles. Legacy risk management systems are not designed to handle dynamic, contextual data from connected devices. The right on-device software should be adaptable to a variety of security solutions. It limited-use key allows a number of payment transactions according to the device threshold parameters such as transaction count and time-to-live value. If the data is not secured properly, it is possible to use the data to perform transactions for the remaining transaction count on an unauthorized device. The on-device software should prevent this type of fraud by first verifying the app, and then optionally the user and device, before initiating the payment transaction. should also be extensible to new solutions such as HCE or other hybrid approaches. 6

7 Device Level Security Although Host Card Emulation has made provisioning credentials easier in a more open mobile payments ecosystem, it has left the credentials on the device prone to various kinds of attacks. The security provided by device operating systems is very thin protection. Possible threats include: Unauthorized access to card data and/or financial services such as payment offered by the mobile application. Theft of code and data from the application for fraudulent use. Modifying application code to cause the application to fail or behave in an unwanted way causing harm to the brand. The code and user credential(s) used to access the application and use services such as payment are particularly prone to hacking in a payment application. The attacker can gainentry by using techniques such as replay attack after stealing user credentials or using a wrong password but by manipulating registers at runtime. If the keys and/or logic involved in securing the card data are not robust, the attacker can steal the card data and use it in different unauthorized transaction scenarios using a stolen Here is what is needed to protect card data on-device: Obfuscation to defend against static code analysis and reverse engineering. Anti-debug and anti-root guards to detect if the application is running in debug mode or is rooted and that disable the application when a threat is detected. Checksum guards to detect static application integrity compromise in the form of unauthorized code change. Encryption of high-risk code sections and use of dummy data to guard against intellectual property theft. Use of multiple binary images of the same application with different randomized obfuscation parameters. Enforcing and concealing safeguards at runtime. Securing sensitive data without storing the encryption key or the user PIN. Securing encryption logic, the code to authenticate the user, code to generate cryptogram, code to activate card for payment and the code to transact with the EMV reader using guard level encryption key(s) hidden in the application code. device or a different device with the stolen credentials. 7

8 Dynamic Management of Account Data is Key The complementary objective is active and dynamic account management to restrict the potential for fraud within predefined limits, such as maximum usage limit or lifetime of the dynamic data. Payment networks use this concept in their specifications for cloud-based payment solutions in order to mitigate the security risk posed by the absence of a secure element. Active account management can be extended to hybrid card storage schemes as well where the dynamic part of card data can be stored in the secure element and the rest in the phone memory. Due to the dynamic nature of mobile devices and cloud-based data, continuous management of data becomes critical. Continuous management of card data includes: Evaluate risk of every transaction. This requires additional data from the mobile device transmitted as part of the transaction data (phone number, device-id). Trigger replenishment of account parameters. This can be replenishment of device thresholds and the one-time use or limited use keys (LUK). Capture on-device telemetry data. These data are continuously captured as part of the mobile app (such as location data and IP address) and are evaluated against defined risk policies. One-time-use passcode. If the system detects a change in pattern then the system may ask user to do an out-of-band authentication such as asking user to enter one-time-use passcode. Digital issuance is responsible for continuous management of the account parameters and the policies that govern the usage of the card data on the device. Application administrators are responsible for defining various parameters and rules such as: Number of times the limited use key (LUK) can be used for transactions Time-to-live value of the key on device Limits on transaction amount Domestic versus international usage limitation Optional telemetry rules such as limiting usage of the card data within 100 mile radius. 8

9 The digital issuance platform and processing host are responsible for sensing when a risk parameter reaches a threshold limit and then initiating replenishment. The digital issuance platform is responsible for notifying the authorization host so that the host has all the data needed to authorize a transaction. Since the bank authorization system sees the authorization transaction data, it plays a role in the risk assessment. If it detects anomaly or sees high risk then it The on-device software must be authenticated to the backend systems such as app management or issuer mbanking systems. As it is likely that there may be multiple payment-enabled apps on the same device, the on-device software must be the security trust endpoint on the device for all trusted apps. Therefore, on-device software must perform authentication of all trusted apps on behalf of the backend app management system. would trigger replenishment of limited-use-keys on the device by notifying the digital issuance platform. Bank administrators should be able to configure policies that govern the behavior of the credential and the transaction. From a policy administration console, administrators should be able to manage the device, risk, and account parameters. Identifying the device is also important to both security and service management across user devices. Multiple parameters including MSISDN, ICCID, IMEI along with user PIN, and temporary passcode can be used to verify this device. Recurring verification of user, app, and device by the on-device software is an essential step in most mobile The app management platform has an important role in payments use cases. dynamic management including authentication of the device, app, and user and managing communication between on-device software and the digital issuance platform as needed. The on-device software plays an active role in keeping track of thresholds related to account parameters and triggering replenishment requests when needed. In addition, it adds value by capturing telemetry data that can be used as threshold parameters. Beyond minimum card network requirements, the on-device software can apply user verification during initial registration of the app according to existing ID&V processes implemented by issuers. The on-device software can also require user PIN during registration process to verify user access to secure services such as payment transactions within a certain timeout period. The user PIN with additional data elements can be used to generate device and user-specific encryption keys to protect the secure data. In addition, the on-device software may also need to support online PIN verification and/or on-demand PIN verification in case of out-of-pattern activity, if required by the issuer. 9

10 Digital Issuance and Dynamic Management Managing card profiles The necessity of using tokens and the emergence of HCE have led to very few changes to card data and technical issues involved in efficient provisioning. The payment industry will leave existing payment network processes largely intact as they expand tokenization and cloud-based payments. With the complex details of data preparation for credential provisioning unchanged, issuers seek data preparation for mobile devices that is more efficient than for smart cards. Digital issuance with real time data preparation leveraging profiles and over the air provisioning achieves this aim. Managing account lifecycle One of the important responsibilities of digital issuance outside of tokenization is to manage the lifecycle of cards issued to mobile phones or ecommerce merchants. Issuers want to prevent fraudulent card use after a device theft and revoke a card issued to a customer who might have violated an agreement that they had entered into with the issuer. This applies to credentials issued to HCE, secure element, and ecommerce merchant systems alike. Additionally, issuers would like to delegate handling of complex lifecycle operations such as card renewal, device change and mobile subscription termination that involve invoking of right set of remote card management operations, which otherwise would require triggering less efficient sequence of individual lifecycle operations. According to payment networks, account data profile management is a stated fundamental capability of a digital issuance platform. The ability to manage different account data profiles and combine them with just the individual card specific data goes a long way in reducing data preparation effort. Account data profiles also increase the efficiency of card data packaging for the device with reduced traffic between the issuer and digital issuance system. Digital issuance systems must also easily onboard existing as well as emerging devices. Onboarding devices means preparing profiles and card data for different secure elements associated to the device and managing metadata such as card art for the various card products targeted for both SE and HCE phones. Banks frequently introduce new card products or revamp card art for existing products and they expect digital issuance systems to be flexible to accommodate art In case of deployments where card issuers act as aggregators for other issuers, efficiently managing account lifecycle through one portal is very important. A portal that allows administrators representing the issuers to remotely sign in and manage the lifecycle of the credentials that they issued is an important feature of digital issuance systems. changes to all onboarded devices. 10

11 Risk Management Device profiles or fingerprints are data that uniquely identifies the phone to the cloud payment system. Matching device fingerprints to authorized users helps the cloud payments system detect fraudulent use of tokens. The following data elements are examples of device fingerprint: Data Integrity checks, device MSISDN, ICCID or IMEI, User PIN and Site Key. Additional information gathering takes advantage of the HCE client app on the phone to collect additional data on the user, such as location, to be used in risk assessment. This dynamic risk management begins with limits on the validity of tokens and includes the limited use keys (LUK) that derive short-lived cryptograms used in cloud payment messaging. Replenishment of the LUK is driven by thresholds, such as time to live and number of transactions, set in the digital issuance system. Other account data can be reset at time of replenishment according to the risk assessment, such as expiry and transaction thresholds. At any time, issuers can replenish the cloud card data based on risk assessment to re-establish an acceptable risk level. 11

12 User Experience and Credential Distribution While security is essential, user experience and convenience is the ultimate test in gaining adoption from end users. It is crucial that the experience is optimized all the way from the app store through the first use experience registering and enrolling the new payment application. Encouraging recurring use of the payment app is a top consideration with the short life span of so many mobile apps. This includes convenient access to payment cards with user PIN or even a default card that is always ready with minimal navigation required by the end user. As adoption of the payment functionality increases, other value added services will be required for end users. The ideal payment experience in a physical retail environment would be seamless and potentially incorporate payment, offers, and loyalty cards among other services. The on-device software and app management system must collaborate in order to manage the lifecycle of the device and apps while maintaining as seamless of a user experience as possible. For example, what happens when a user swaps SIMs, changes phone number, upgrades or loses the device? All of these scenarios are important considerations for on-device software. Coexistence of multiple payment apps on a single device is inevitable. This can range between MNO apps, issuer or mbanking apps, merchant apps, and other mobile wallets. Where federation of card data is supported, the on-device software must be able to manage card metadata and other elements for a consistent user experience across multiple apps. This needs to be accomplished without disintermediation of the multiple parties involved. By retaining complete control of branding and user experience, issuers, merchants, and service providers are enabled to extend existing relationships with customers while forging new ones with improved user experiences and useful functionality. Although the end user experience is the top consideration, the experience for issuers and merchants that are being on-boarded to the system is important as well. The on-device software combined with the app management system must provide a simple and convenient method of configuring business rules for distribution, rights and permissions, ID&V, and much more. Issuers and merchants want flexibility in presentation technologies so that they can easily incorporate NFC, optical codes, BLE, or other new technologies. Ideally, these features associated with payment functionality can be incorporated into the existing mobile apps in which issuers and merchants have already invested heavily. 12

13 Sequent Value Sequent has addressed the needs of HCE-tokenization solution holistically with particular focus on security and risk management. Sequent brings to bear many years of experience in deploying NFC-based payment systems in a highly regulated market and various components that are already commercially deployed at many tier-1 institutions. Distribution Sequent Wallet Management Server provides the functionality needed to distribute card data to millions of mobile end points. It manages the authenticity of the devices, secures communication to the devices and manages the lifecycle of the application on the devices. On-device security Sequent Open Wallet Platform and Core Card Services (CCS) secure card data and tokens on-device and provide the best security in the industry for HCE-based mobile payments without reliance on hardware-based secure elements. Commercially deployed in multiple rollouts, Sequent CCS is on-device middleware that provides a unique patent-pending mechanism to protect the card data on-device. CCS uses the user PIN to generate encryption keys to protect card data without storing the PIN on-device. The mechanism works in the scenario where the device is not connected to the network. In addition, it always authenticates the user and the calling app before initiating a payment transaction. Sequent protect the on-device application code and the card data using: Patent pending local data encryption logic Tools and techniques to protect application integrity including white-box cryptography Sequent Open Wallet Platform and Core Card Services (CCS) secure card data and tokens on-device and provide the best security in the industry for HCE mobile payments without reliance on hardware-based secure elements. 13

14 Risk management Sequent provides multiple measures to help banks better manage risk such as: Monitor location data to determine if account data require replenishment Continuously monitor state and authenticity of device and application The data preparation engine of Sequent Digital Issuance Server provides maximum flexibility to issuers in deciding which data elements must come from the issuer and which data elements can be kept as a profile in the Digital Issuance Server. This provides improved provisioning efficiency by keeping the traffic light from banks to the Digital Issuance Server. Allow banks to define policies that determine replenishment rules Annotate transaction data with device details to help authorization system verify device fingerprint Sequent Digital Issuance Server offers a portal where the issuer customer support representatives can sign in, query the contents of mobile phones of their customers, and conveniently trigger lifecycle operations such as deleting a card or blocking a card or unblocking a blocked card. Dynamic issuance and management Sequent Digital Issuance Server offers a user-friendly Account Data Profile Management system that guides the user through a top-down sequence of configuration steps to define the account data profiles to fit the different card Modular configuration Sequent products are built in a modular configuration to enable integration with third-party Token Service Providers (TSP), Trusted Service Managers (TSMs) and legacy issuance systems already present in banks and other issuers. product profiles from banks. This module also has the ability to determine the device profile and prepare the device specific card data elements for both SE and HCE based provisioning. The key advantage here is the easy onboarding of existing and emerging devices. 14

15 Why Sequent? Sequent is the world s leading provider of digital issuance and mobile wallet platform-as-a-service that delivers secure mobile payments and value-added services to banks, mobile operators, merchants and access control providers. With Sequent, customers can offer wallet services open to an ecosystem of partners and developers, while meeting the requirements of highly secure and regulated industries. Sequent products include: Sequent Open Wallet Platform, Digital Issuance Platform, and Trust Authority. Sequent is endorsed and used by major customers on four continents. Sequent Software Inc. contactus@sequent.com

Ensuring the Safety & Security of Payments. Faster Payments Symposium August 4, 2015

Ensuring the Safety & Security of Payments. Faster Payments Symposium August 4, 2015 Ensuring the Safety & Security of Payments Faster Payments Symposium August 4, 2015 Problem Statement: The proliferation of live consumer account credentials Bank issues physical card Plastic at point

More information

HCE E-Book HOST CARD EMULATION: NFC S MISSING LINK

HCE E-Book HOST CARD EMULATION: NFC S MISSING LINK HCE E-Book HOST CARD EMULATION: NFC S MISSING LINK HOST CARD EMULATION: NFC S MISSING LINK Contents Executive Summary 3 1. What is HCE? 5 2. Implementation options 11 3. HCE & security: tokenization 12

More information

Quick Guide. Token Service Provider

Quick Guide. Token Service Provider Quick Guide Token Service Provider 1 Introduction to Mobile Payments The mobile payments revolution is here! Driven by the development of near field communication (NFC) enabled smartphones, the launch

More information

Mobile and Contactless Payments Requirements and Interactions

Mobile and Contactless Payments Requirements and Interactions Mobile and Contactless Payments Requirements and Interactions Version 1.0 Date: February 2018 2018 U.S. Payments Forum and Smart Card Alliance. All rights reserved. Page 1 About the U.S. Payments Forum

More information

HCE Driving NFC: From Idea to Reality to Ubiquity. Mobey Day October 7/8, 2014

HCE Driving NFC: From Idea to Reality to Ubiquity. Mobey Day October 7/8, 2014 HCE Driving NFC: From Idea to Reality to Ubiquity Mobey Day October 7/8, 2014 M-PAYMENTS & NFC ADOPTION? 2 WHY SO SLOW? The trend towards mobile has set in everywhere else Contactless card use and acceptance

More information

Quick Guide. Token Service Provider

Quick Guide. Token Service Provider Quick Guide Token Service Provider Introduction to Mobile Payments The mobile payments revolution is here! Driven by the development of near field communication (NFC) enabled smartphones, the launch of

More information

Tokenization: What, Why and How

Tokenization: What, Why and How Tokenization: What, Why and How 11/5/2015 UL Transaction Security 2011 Underwriters Laboratories Inc. We have EMV why do we need tokenization? From Magstripe Merchant Signature Issuer Magstripe Risk Management

More information

Aconite Smart Solutions

Aconite Smart Solutions Aconite Smart Solutions PIN Management Services Contents PIN MANAGEMENT... 3 CURRENT CHALLENGES... 3 ACONITE PIN MANAGER SOLUTION... 4 OVERVIEW... 4 CENTRALISED PIN VAULT... 5 CUSTOMER PIN SELF SELECT

More information

Proxama PIN Manager. Bringing PIN handling into the 21 st Century

Proxama PIN Manager. Bringing PIN handling into the 21 st Century Proxama PIN Manager Bringing PIN handling into the 21 st Century I am not a number I am a free man So said the The Prisoner in that 1960s cult TV show, but Personal Identification Number, or PIN, was adopted

More information

Tokenization: The Future of Payments

Tokenization: The Future of Payments Tokenization: The Future of Payments Security? Background The Payment Card Industry Data Security Standard (PCI-DSS) was created to increase controls around cardholder data to reduce credit card fraud

More information

Tokenization April Tokenization. Gregory H. Soule, CPA, CISA, CISSP, CFE Senior Manager. Andrews Hooper Pavlik PLC

Tokenization April Tokenization. Gregory H. Soule, CPA, CISA, CISSP, CFE Senior Manager. Andrews Hooper Pavlik PLC ization Gregory H. Soule, CPA, CISA, CISSP, CFE Senior Manager Andrews Hooper Pavlik PLC 1 Agenda and Implementation EMV, Encryption, ization Apple Pay Google Wallet Recent Trends Resources Agenda and

More information

How Safe Are Mobile Payments? MAC Webinar

How Safe Are Mobile Payments? MAC Webinar How Safe Are Mobile Payments? MAC Webinar March 16, 2017 Dave Lott Payments Risk Expert Federal Reserve Bank of Atlanta The views expressed in this presentation are those of the presenters and do not necessarily

More information

EMV Terminology Guide

EMV Terminology Guide To make life easier, TMG has compiled some of the most commonly used EMV terms in this guide. If you have questions about EMV, contact your Director of Client Relations directly or email clientrelations@themebersgroup.com.

More information

X Infotech Banking. Software solutions for smart card issuance

X Infotech Banking. Software solutions for smart card issuance X Infotech Banking Software solutions for smart card issuance WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for centralized and instant issuance of financial and non-financial

More information

TOKENIZATION: THE FUTURE OF ACCOUNT NUMBERS. Steve Ledford The Clearing House

TOKENIZATION: THE FUTURE OF ACCOUNT NUMBERS. Steve Ledford The Clearing House TOKENIZATION: THE FUTURE OF ACCOUNT NUMBERS Steve Ledford The Clearing House Problem Statement: The proliferation of live account credentials creates huge risks Bank issues physical card Plastic at point

More information

HCE, Apple Pay Real NFC Game-Changers? WHITE PAPER

HCE, Apple Pay Real NFC Game-Changers? WHITE PAPER HCE, Apple Pay Real NFC Game-Changers? WHITE PAPER 1 2 Contents Introduction 4 1. The landscape of mobile NFC payment 5 2. HCE, the second breath of NFC 8 2.1. What is HCE? 8 2.2. Main impacts of HCE on

More information

Best Practices For Tokenization Projects In The Payments Industry

Best Practices For Tokenization Projects In The Payments Industry Best Practices For Tokenization Projects In The Payments Industry The Payment Industry s Move To Tokenization While EMV is effective for securing card transactions at point-of-sale terminals, it is less

More information

TAS CASHLESS 3.0 FOCUS ON. The absolute framework for electronic payment management. CASHLESS 3.0: the ultimate. payment experience

TAS CASHLESS 3.0 FOCUS ON. The absolute framework for electronic payment management. CASHLESS 3.0: the ultimate. payment experience TAS CASHLESS 3.0 The absolute framework for electronic payment management CASHLESS 3.0: the ultimate payment experience CASHLESS 3.0 is TAS innovative processing platform that enables financial institutions,

More information

HCE, Apple Pay The shock of simplifying the NFC? WHITE PAPER

HCE, Apple Pay The shock of simplifying the NFC? WHITE PAPER HCE, Apple Pay The shock of simplifying the NFC? WHITE PAPER 2 Contents Introduction 4 1. The landscape of mobile NFC payment 5 2. HCE, the second breath of NFC 8 2.1. What is HCE? 8 2.2. Main impacts

More information

In this Document: EMV Payment Tokenisation Payment Account Reference (PAR) FAQ EMV Payment Tokenisation Technical FAQ

In this Document: EMV Payment Tokenisation Payment Account Reference (PAR) FAQ EMV Payment Tokenisation Technical FAQ In this Document: EMV Payment Tokenisation General FAQ EMV Payment Tokenisation Payment Account Reference (PAR) FAQ EMV Payment Tokenisation Technical FAQ EMV Payment Tokenisation General FAQ 1. What is

More information

The Evolution of Payment Specifications and Tokenization. Smart Card Alliance and EMVCo Webinar November 4, 2015

The Evolution of Payment Specifications and Tokenization. Smart Card Alliance and EMVCo Webinar November 4, 2015 The Evolution of Payment Specifications and Tokenization Smart Card Alliance and EMVCo Webinar November 4, 2015 Presenters and Agenda Tokenization as a Layered Security Approach for Secure Payments Randy

More information

EMV Chip Cards. Table of Contents GENERAL BACKGROUND GENERAL FAQ FREQUENTLY ASKED QUESTIONS GENERAL BACKGROUND...1 GENERAL FAQ MERCHANT FAQ...

EMV Chip Cards. Table of Contents GENERAL BACKGROUND GENERAL FAQ FREQUENTLY ASKED QUESTIONS GENERAL BACKGROUND...1 GENERAL FAQ MERCHANT FAQ... EMV Chip Cards FREQUENTLY ASKED QUESTIONS Table of Contents GENERAL BACKGROUND...1 GENERAL FAQ...1 4 MERCHANT FAQ...5 PROCESSOR/ATM PROCESSOR FAQ... 6 ISSUER FAQ... 6 U.S.-SPECIFIC FAQ...7 8 GENERAL BACKGROUND

More information

Secure SoC Manufacturing: Foundation for a Connected World

Secure SoC Manufacturing: Foundation for a Connected World Secure SoC Manufacturing: Foundation for a Connected World As mobile usage continues to permeate daily lives with increasingly sensitive data and high-value transactions, the importance of device security

More information

Tokens, Tokens, Tokens: What are the different kinds of tokens and what do they do?

Tokens, Tokens, Tokens: What are the different kinds of tokens and what do they do? Tokens, Tokens, Tokens: What are the different kinds of tokens and what do they do? Lanny Byers, VP Emerging Payment Solutions February 25, 2019/3:30PM/Grand Ballroom J-K The way consumers buy has changed

More information

PREPARING FOR THE UNEXPECTED: EMERGENCY CARD REPLACEMENT & MASS ISSUANCE STRATEGIES

PREPARING FOR THE UNEXPECTED: EMERGENCY CARD REPLACEMENT & MASS ISSUANCE STRATEGIES PREPARING FOR THE UNEXPECTED: EMERGENCY CARD REPLACEMENT & MASS ISSUANCE STRATEGIES By Ray Wizbowski, Vice President of Marketing, Financial Vertical Datacard Group BREACHES AND OTHER EMERGENCIES STRATEGIES

More information

Visa s Future of Security Roadmap: Australia

Visa s Future of Security Roadmap: Australia Visa s Future of Security : Australia Contents Executive Summary 3-Domain Secure 2.0 Biometrics Tokenisation EMV Chip Technology Expanding Mobile Acceptance Mobile Geo-location Transaction Controls and

More information

Apple Pay and Tokenization Background and Overview

Apple Pay and Tokenization Background and Overview A Euronet Software Solutions White Paper Apple Pay and Tokenization Background and Overview By Stephen Butcher Euronet Software Solutions Product Manager Cards and Networks November 2014 2014 Euronet Software

More information

SecuRe Pay recommendations for the security of mobile payments

SecuRe Pay recommendations for the security of mobile payments ECB-PUBLIC FINAL SecuRe Pay recommendations for the security of mobile payments Stephanie Czák Senior Market Infrastructure Expert European Central Bank ETSI/EC Collaborative Ecosystem for M-Payments Workshop

More information

Protecting Payments Throughout the Ecosystem. Emma Sutcliffe Senior Director, Data Security Standards PCI Security Standards Council

Protecting Payments Throughout the Ecosystem. Emma Sutcliffe Senior Director, Data Security Standards PCI Security Standards Council Protecting Payments Throughout the Ecosystem Emma Sutcliffe Senior Director, Data Security Standards PCI Security Standards Council PCI Security Standards Council Founded in 2006 Guiding open standards

More information

My new Apple device will have a payment feature. How do I set it up?

My new Apple device will have a payment feature. How do I set it up? F S HOW IT WORKS: PPLE PY ND DIGITL CCOUNT NUMBERS My new pple device will have a payment feature. How do I set it up? Before making payment with your new pple Device you will need to follow a few simple

More information

When the hard-to-reach become your preferred customers. Finc / the offering which addresses financial inclusion challenges

When the hard-to-reach become your preferred customers. Finc / the offering which addresses financial inclusion challenges When the hard-to-reach become your preferred customers Finc / the offering which addresses financial inclusion challenges Powering the Financial Inclusion revolution Today, 75% of the world s population

More information

PROTECT AGAINST A DATA BREACH & ADDRESS PCI DSS COMPLIANCE WITH TRUSTCOMMERCE

PROTECT AGAINST A DATA BREACH & ADDRESS PCI DSS COMPLIANCE WITH TRUSTCOMMERCE WHITE PAPER PROTECT AGAINST A DATA BREACH & ADDRESS PCI DSS COMPLIANCE WITH TRUSTCOMMERCE p 800.915.1680 www.trustcommerce.com 2016 TrustCommerce. All Rights Reserved. No part of this document may be distributed,

More information

The Future of Payment Security in Canada

The Future of Payment Security in Canada The Future of Payment Security in Canada October 2017 1 Visa Canada Public The Future of Payment Security in Canada Notices Forward-Looking Statements This presentation contains forward-looking statements

More information

#mstrworld. Mobile Identity for Loyalty and Payment Card Solutions. Bryan Peace, Product Manager Analyst

#mstrworld. Mobile Identity for Loyalty and Payment Card Solutions. Bryan Peace, Product Manager Analyst Mobile Identity for Loyalty and Payment Card Solutions Bryan Peace, Product Manager Analyst The Mobile Wave How Mobile Intelligence Will Change Everything We live in one of the greatest times in history.

More information

Understanding Your Enterprise API Requirements

Understanding Your Enterprise API Requirements Understanding Your Enterprise Requirements Part 2: The 3 management platforms which architecture model fits your business? Strategically choosing the right management architecture model will ensure your

More information

Introduction to EMV BEYOND PAYMENT

Introduction to EMV BEYOND PAYMENT Introduction to EMV TAKING YOU TAKING YOU BEYOND PAYMENT Why EMV? Security Magstripe cards are easily reproduced EMV can verify card and user authenticity Chip & PIN Interoperability The world has moved

More information

KONA Software Lab Ltd. (KONA SL) October 10, 2017

KONA Software Lab Ltd. (KONA SL) October 10, 2017 KONA Software Lab Ltd. (KONA SL) October 10, 2017 ABOUT KONA SL Company History 2012 2013 2014 2015 2016 Started as JV BD Management TM Globally Global Events Sales & Marketing KonaSL started as JV between

More information

MobileKnowledge. We help companies leverage the secure IoT revolution

MobileKnowledge. We help companies leverage the secure IoT revolution IoT and security MobileKnowledge MobileKnowledge is a team of HW, SW and system engineers, experts in smart, connected and secure technologies for the IoT world. We are your ideal engineering consultant

More information

Is there a case for the regulation of Tokenization services?

Is there a case for the regulation of Tokenization services? Is there a case for the regulation of Tokenization services? An SPA Position May 2016 1. Introduction The initiation of a card payment first requires the transmission of the card s Payment Account Number

More information

EMV THE DEFINITIVE GUIDE FOR US MERCHANTS AND POS RESELLERS

EMV THE DEFINITIVE GUIDE FOR US MERCHANTS AND POS RESELLERS EMV THE DEFINITIVE GUIDE FOR US MERCHANTS AND POS RESELLERS WHAT IS EMV EMV is a global standard for credit and debit card processing designed to replace magnetic stripe cards. Also referred to as chip

More information

EMV Validation (on-behalf of) Service

EMV Validation (on-behalf of) Service PRODUCT CAPABILITY GUIDE EMV Validation (on-behalf of) Service EMV Validation (on-behalf of) Service Provide Issuers with the Ability to Implement EMV Quickly and Easily A global security standard for

More information

INTEGRATING PING IDENTITY SOLUTIONS WITH GOOGLE IDENTITY SERVICES

INTEGRATING PING IDENTITY SOLUTIONS WITH GOOGLE IDENTITY SERVICES INTEGRATING PING IDENTITY SOLUTIONS WITH GOOGLE IDENTITY SERVICES How two technologies work together to add more value to your enterprise TABLE OF CONTENTS 03 04 05 06 07 08 08 08 EXECUTIVE SUMMARY INTEGRATION

More information

Integrating Payments: Design Principles For A Cashless Future. Monojit Basu, Founder and Director, TechYugadi IT Solutions & Consulting

Integrating Payments: Design Principles For A Cashless Future. Monojit Basu, Founder and Director, TechYugadi IT Solutions & Consulting Integrating Payments: Design Principles For A Cashless Future Monojit Basu, Founder and Director, TechYugadi IT Solutions & Consulting Agenda Current and emerging techniques to integrate merchant apps

More information

D.1.2 Report on requirements study II

D.1.2 Report on requirements study II D.1.2 Report on requirements study II Faysal Boukayoua, Italo Dacosta (editor), Koen Decroix, Bart De Decker (editor), Jorn Lapon, Luc Martens, Milica Milutinovic (editor), Vincent Naessens, Bart Preneel,

More information

TAS FOCUS ON. The absolute framework for electronic payment management. cashless 3.0: the ultimate. payment experience IN THIS DOCUMENT

TAS FOCUS ON. The absolute framework for electronic payment management. cashless 3.0: the ultimate. payment experience IN THIS DOCUMENT TAS The absolute framework for electronic payment management cashless 3.0: the ultimate payment experience Today s market globalization demands speed, ease of use and flexibility. TAS Group s response:

More information

Mobile & Online Banking

Mobile & Online Banking Mobile & Online Banking Digital banking - no longer a matter of nice to have In today s world, online and mobile banking are no longer nice to have on the consumer s mind. Consumer s daily lives are seamlessly

More information

MOBILE (NFC) SOLUTIONS

MOBILE (NFC) SOLUTIONS TRANSFORMS YOUR PAYMENTS PERSPECTIVE SOLUTION FLYER MOBILE (NFC) SOLUTIONS VENDOR INDEPENDENCE SUPPORTING OPEN STANDARDS AND INTERFACES PREDICTABLE INTEGRATION TIMES FOR FASTER TIME TO MARKET FLEXIBLE,

More information

FINASTRA DIGITAL BANKING CONSUMER THE NEW GENERATION OF BANKING IS A CROSS-PLATFORM, MOBILE EXPERIENCE SOLUTION

FINASTRA DIGITAL BANKING CONSUMER THE NEW GENERATION OF BANKING IS A CROSS-PLATFORM, MOBILE EXPERIENCE SOLUTION FINASTRA DIGITAL BANKING CONSUMER THE NEW GENERATION OF BANKING IS A CROSS-PLATFORM, MOBILE EXPERIENCE SOLUTION 2 FINASTRA Brochure INTRODUCTION One App. Everyone. Everywhere. Everything. The Next Generation

More information

esocket POS Integrated POS solution Knet

esocket POS Integrated POS solution Knet esocket POS Integrated POS solution Knet 1 Summary Since 1994 when the first POS devise was deployed in the market, Knet had recognized the importance of this service and did take it up on it self to invest

More information

EMV 3-D Secure provides the path to fast, frictionless authentication

EMV 3-D Secure provides the path to fast, frictionless authentication EMV 3-D Secure provides the path to fast, frictionless authentication MASTERCARD IDENTITY CHECK TM Current landscape As countries around the globe make the move to EMV chip, organized crime will look for

More information

THE ADOPTION OF EMV TECHNOLOGY IN THE U.S. By Guy Berg Global Industry Sales Consultant Datacard Group

THE ADOPTION OF EMV TECHNOLOGY IN THE U.S. By Guy Berg Global Industry Sales Consultant Datacard Group THE ADOPTION OF EMV TECHNOLOGY IN THE U.S. By Guy Berg Global Industry Sales Consultant Datacard Group Abstract: Visa Inc. and MasterCard recently announced plans to accelerate chip migration in the United

More information

EMV 3-D Secure Press Kit Q&A

EMV 3-D Secure Press Kit Q&A EMV 3-D Secure Press Kit Q&A 1. What is EMV 3-D Secure? EMV Three-Domain Secure (3DS) is a messaging protocol that enables frictionless consumer authentication and the ability for consumers to authenticate

More information

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and Getting Started with Multi-factor Authentication Solutions

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and Getting Started with Multi-factor Authentication Solutions BUYER S GUIDE: MFA BUYER S GUIDE Evaluating and Getting Started with Multi-factor Authentication Solutions NEW CAPABILITIES One-size-fits-all authentication is a relic of the past, and the days of hard

More information

Worldline Wallet & Mobile Payments. G. Regnault- Rotterdam 21/03/2017

Worldline Wallet & Mobile Payments. G. Regnault- Rotterdam 21/03/2017 Worldline Wallet & Mobile Payments G. Regnault- Rotterdam 21/03/2017 1 We are at the crossroads What if What if What if What if Wallet by Worldline : definition What it is Expected benefits Worldline Wallet

More information

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and getting started with modern MFA solutions

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and getting started with modern MFA solutions BUYER S GUIDE: MFA BUYER S GUIDE Evaluating and getting started with modern MFA solutions NEW CAPABILITIES One-size-fits-all authentication is a relic of the past, and the days of hard tokens as the default

More information

DELIVER A TRULY DIGITAL WALLET EXPERIENCE. Powering customer engagement and business growth. Finacle Digital Wallet Solution

DELIVER A TRULY DIGITAL WALLET EXPERIENCE. Powering customer engagement and business growth. Finacle Digital Wallet Solution DELIVER A TRULY DIGITAL WALLET EXPERIENCE Powering customer engagement and business growth Finacle Digital Wallet Solution The universal adoption of smart phones has opened up a ubiquitous channel which

More information

Covering Your Assets: Payment Landscape and Technology

Covering Your Assets: Payment Landscape and Technology Covering Your Assets: Payment Landscape and Technology Keith Lam Sr. Product Manager 2016 Epicor Software Corporation Keith Lam Senior Product Manager 9+ years at Epicor, focusing on building great products

More information

The Evolution of Payment Specifications and Tokenization. Smart Card Alliance and EMVCo Webinar October 1, 2015

The Evolution of Payment Specifications and Tokenization. Smart Card Alliance and EMVCo Webinar October 1, 2015 The Evolution of Payment Specifications and Tokenization Smart Card Alliance and EMVCo Webinar October 1, 2015 Presenters and Agenda U.S. Market Progress Randy Vanderhoof Executive Director Smart Card

More information

OU, IM990C, Master Computer Science. Thesis Security evaluation of the NFC contactless payment protocol using Model Based testing

OU, IM990C, Master Computer Science. Thesis Security evaluation of the NFC contactless payment protocol using Model Based testing OU, IM990C, Master Computer Science Thesis Security evaluation of the NFC contactless payment protocol using Model Based testing Name: ing. J. (Jacob) Merkus Student number: 838580992 Email: jacobmerkus@gmail.com

More information

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2)

OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) OpenBank - banking platform for e-money management based on blockchain technology (version 0.2) Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin Abstract Traditional banking technology has multiple

More information

THE NEXT EVOLUTION IN COMMERCE: INVISIBLE PAYMENTS

THE NEXT EVOLUTION IN COMMERCE: INVISIBLE PAYMENTS THE NEXT EVOLUTION IN COMMERCE: INVISIBLE PAYMENTS WHAT THIS SHIFT MEANS FOR CONSUMERS AND THE COMPANIES THAT SERVE THEM A White Paper by i2c, Inc. 1300 Island Drive Suite 105 Redwood City, CA 94065 USA

More information

Payment Strategies and Considerations for Transit. David L. dekozan Vice President, Strategic Initiatives Cubic Transportation Systems, Inc.

Payment Strategies and Considerations for Transit. David L. dekozan Vice President, Strategic Initiatives Cubic Transportation Systems, Inc. Payment Strategies and Considerations for Transit David L. dekozan Vice President, Strategic Initiatives Cubic Transportation Systems, Inc. Key Themes How did we get here? AFC 101 in 10 minutes or less

More information

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy? SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY How Can I Both Enable and Protect My Organization in the New Application Economy? CA Security solutions can help you enable and protect your business

More information

Automatic Demand Draft Generation using the Automated Teller Machine

Automatic Demand Draft Generation using the Automated Teller Machine Automatic Demand Draft Generation using the Automated Teller Machine Shraddha V MTech in CSE, Department of Computer Science and Engineering, AMC Engineering College Bangalore, Jayashubha J Associate Prof,

More information

Securing Your Business in the Digital Age

Securing Your Business in the Digital Age SAP Solution in Detail SAP GRC Solutions SAP Access Control Securing Your Business in the Digital Age 1 / 13 Table of Contents 3 Quick Facts 4 Governing Access Efficiently in a Hyperconnected World 7 Analyzing

More information

EMV: Facts at a Glance

EMV: Facts at a Glance EMV: Facts at a Glance 1. What is EMV? EMV is an open-standard set of specifications for smart card payments and acceptance devices. The EMV specifications were developed to define a set of requirements

More information

MITIGATE THE RISK OF FRAUD AND COMPLIANCE COSTS with EMV mandates. An NCR white paper

MITIGATE THE RISK OF FRAUD AND COMPLIANCE COSTS with EMV mandates. An NCR white paper MITIGATE THE RISK OF FRAUD AND COMPLIANCE COSTS with EMV mandates An NCR white paper Don t let your aging ATM network put you at risk of non-compliance and the threat of liability for fraudulent transactions.

More information

Cards on the table! Bernd Filsinger Payment Technology Services Lead Client Support Services, Europe region

Cards on the table! Bernd Filsinger Payment Technology Services Lead Client Support Services, Europe region Cards on the table! Bernd Filsinger Payment Technology Services Lead Client Support Services, Europe region Notice of confidentiality This presentation is furnished to you solely in your capacity as a

More information

EMV: Strengthen Your Business Through Secure Payments

EMV: Strengthen Your Business Through Secure Payments PRODUCT CAPABILITY GUIDE EMV Chip Cards Payments EMV Chip Cards Payments EMV: Strengthen Your Business Through Secure Payments As EMV chip-based technology gains coverage around the world, it gets easier

More information

Security Evaluation of Apple Pay at Point-of-Sale Terminals

Security Evaluation of Apple Pay at Point-of-Sale Terminals 2016 10th International Conference on Next Generation Mobile Applications, Security and Technologies Security Evaluation of Apple Pay at Point-of-Sale Terminals Marian Margraf Freie Universität Berlin

More information

Delivering high-integrity accounting with Xero

Delivering high-integrity accounting with Xero Delivering high-integrity accounting with Xero Contents Untouched data feeds directly into Xero 4 A multi-layered approach to data integrity 5 Access controls 6 Monitoring and alerts 7 Controls and reporting

More information

Testing Solutions for Hyper-Connected Apps

Testing Solutions for Hyper-Connected Apps Testing Solutions for Hyper-Connected Apps Don t let functionality cause testing chaos Andrew Morgan (andrew.morgan@infostretch.com) 2019 Infostretch. All rights reserved. 1 1 Your Speaker: Andrew Morgan

More information

BEST PRACTICES: DEPLOYING SPOK MOBILE WITH ENTERPRISE MOBILITY MANAGMENT. spok.com

BEST PRACTICES: DEPLOYING SPOK MOBILE WITH ENTERPRISE MOBILITY MANAGMENT. spok.com SM BEST PRACTICES: DEPLOYING SPOK MOBILE WITH ENTERPRISE MOBILITY MANAGMENT 1 DEPLOYING SPOK MOBILE WITH ENTEPRISE MOBILITY MANAGMENT Scalability and adoption are significant challenges that IT professionals

More information

Turning PSD2 Challenges into Business Opportunities.

Turning PSD2 Challenges into Business Opportunities. Turning PSD2 Challenges into Business Opportunities www.ebankit.com PSD2 in a nutshell Perfect Competition Payment Services Directive 2 (PSD2) The PSD2 updates and complements the EU rules put in place

More information

loyalty points Smartphone PINpad portal of fers secure terminal Android windows receipt business banking customer experience

loyalty points Smartphone PINpad portal of fers secure terminal Android windows receipt business banking customer experience tance ner ce ation m a voucher transactions Windows d payments eckout customer receipt credit shop M-invoicing Tablet io S mpos inno BlackBer ry seamless NF C ios receipt business banking loyalty points

More information

ECSG (Vol Ref. 8.A01.00) SEPA CARDS STANDARDISATION (SCS) VOLUME. Payments and Cash Withdrawals with Cards in SEPA

ECSG (Vol Ref. 8.A01.00) SEPA CARDS STANDARDISATION (SCS) VOLUME. Payments and Cash Withdrawals with Cards in SEPA ECSG001-17 01.03.2017 (Vol Ref. 8.A01.00) SEPA CARDS STANDARDISATION (SCS) VOLUME STANDARDS REQUIREMENTS ANNEX 01 SEPA CARDS TRANSACTION FLOWS Payments and Cash Withdrawals with Cards in SEPA Applicable

More information

PayPass M/Chip Requirements. 3 July 2013

PayPass M/Chip Requirements. 3 July 2013 PayPass M/Chip Requirements 3 July 2013 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional information online. Proprietary

More information

Healthcare Identity Authentication and Payments Convergence: A Vision for the Healthcare Industry

Healthcare Identity Authentication and Payments Convergence: A Vision for the Healthcare Industry A SMART CARD ALLIANCE HEALTH AND HUMAN SERVICES COUNCIL WHITE PAPER Healthcare Identity Authentication and Payments Convergence: A Vision for the Healthcare Industry Publication Date: February 2016 Publication

More information

EMV Adoption in the U.S.

EMV Adoption in the U.S. EMV Adoption in the U.S. What you need to know about the outcome of EMV adoption in other countries and the implications for adoption in the U.S. Table of Contents Introduction [3] What is EMV? [4] The

More information

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software WHITE PAPER: COMPARING TCO: SYMANTEC MANAGED PKI SERVICE........ VS..... ON-PREMISE........... SOFTWARE................. Comparing Cost of Ownership: Symantec Managed PKI Service vs. On- Premise Software

More information

Increase Efficiency Boost Growth Stay Ahead of the Curve

Increase Efficiency Boost Growth Stay Ahead of the Curve Increase Efficiency Boost Growth Stay Ahead of the Curve 3 Payments are going digital, contactless and mobile at a stunning pace. And while bank branches are still very much part of our urban landscape,

More information

On-Demand Solution Planning Guide

On-Demand Solution Planning Guide On-Demand Solution Planning Guide Powering On-Demand Solutions www.growthclick.com hello@growthclick.com Copyright 2019 GrowthClick Inc. All Rights Reserved. 1 3 Steps to Planning an On-Demand Solution

More information

Terms and Conditions for using BEA Credit Card in Digital Wallet

Terms and Conditions for using BEA Credit Card in Digital Wallet Terms and Conditions for using BEA Credit Card in Digital Wallet These Terms and Conditions for using your BEA Credit Card in Digital Wallet ("Terms and Conditions") apply when you choose to add a BEA

More information

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and getting started with modern MFA solutions

BUYER S GUIDE: MFA BUYER S GUIDE. Evaluating and getting started with modern MFA solutions BUYER S GUIDE: MFA BUYER S GUIDE Evaluating and getting started with modern MFA solutions NEW CAPABILITIES One-size-fits-all authentication is a relic of the past, and the days of hard tokens as the default

More information

Secure Smart Cores. Architecture License. Provisioning ******** Services. Value-Added Services. Provisioning IoT. CryptoManager

Secure Smart Cores. Architecture License. Provisioning ******** Services. Value-Added Services. Provisioning IoT. CryptoManager Value-Added Services Architecture License Secure Smart Cores Provisioning ******** $ Media Ticketing Payment Provisioning IoT Services DPA Countermeasures DPA Resistant Cores CryptoMedia CryptoManager

More information

TOKENIZATION OF A PHYSICAL DEBIT OR CREDIT CARD FOR PAYMENT

TOKENIZATION OF A PHYSICAL DEBIT OR CREDIT CARD FOR PAYMENT Technical Disclosure Commons Defensive Publications Series January 31, 2016 TOKENIZATION OF A PHYSICAL DEBIT OR CREDIT CARD FOR PAYMENT Ritcha Ranjan Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

INTEGRATING HORIZON AND CITRIX APPS IN A DIGITAL WORKSPACE

INTEGRATING HORIZON AND CITRIX APPS IN A DIGITAL WORKSPACE INTEGRATING HORIZON AND CITRIX APPS IN A DIGITAL WORKSPACE Aligning Your Windows-Based Infrastructure for a Digital Workspace In today s enterprise, applications come in many different shapes and sizes.

More information

WHITE PAPER. Focus on value added services by network companies a paradigm shift. Rahul Kaushal, Ramakant Mittal

WHITE PAPER. Focus on value added services by network companies a paradigm shift. Rahul Kaushal, Ramakant Mittal WHITE PAPER Focus on value added services by network companies a paradigm shift Rahul Kaushal, Ramakant Mittal Introduction Network association is the most critical player in the payment card industry.

More information

tripos: Building a next generation POS starts with the right payment solution

tripos: Building a next generation POS starts with the right payment solution tripos: Building a next generation POS starts with the right payment solution 1 Developers of integrated point of sale (POS) applications face a variety of challenges. From the shift to EMV, to concerns

More information

EMV and Educational Institutions:

EMV and Educational Institutions: October 2014 EMV and Educational Institutions: What you need to know Mike English Executive Director, Product Development Heartland Payment Systems 2014 Heartland Payment Systems, Inc. All trademarks,

More information

EMV 3-D Secure Press Kit Q&A

EMV 3-D Secure Press Kit Q&A EMV 3-D Secure Press Kit Q&A 1. What is EMV 3-D Secure? EMV 3-D Secure (3DS) is a messaging protocol that promotes frictionless consumer authentication and enables consumers to authenticate themselves

More information

Winter 2019 Network Updates. Webinar Presentation January 29, 2019

Winter 2019 Network Updates. Webinar Presentation January 29, 2019 Winter 2019 Network Updates Webinar Presentation January 29, 2019 ALL BRANDS 2 [UPDATE/REMINDER] Return Authorization Requirements, All Brands Visa, Discover, and Mastercard will require acquirers and

More information

PIN Issuance & Management

PIN Issuance & Management PIN Issuance & Management From PIN selection to PIN verification Card issuers and merchants know they can put their trust in MagTek. Whether meeting the growing need for instant, in-branch card and PIN

More information

X Infotech Government

X Infotech Government X Infotech Government Software solutions for identity documents WWW.X-INFOTECH.COM About X Infotech provides turnkey software solutions for issuance, management and verification of electronic identity

More information

What Do You Need to Ensure a Successful Transition to IoT?

What Do You Need to Ensure a Successful Transition to IoT? What Do You Need to Ensure a Successful Transition to IoT? As the business climate grows ever more competitive, industrial companies are looking to the Internet of Things (IoT) to provide the business

More information

BACSOFT IOT PLATFORM: A COMPLETE SOLUTION FOR ADVANCED IOT AND M2M APPLICATIONS

BACSOFT IOT PLATFORM: A COMPLETE SOLUTION FOR ADVANCED IOT AND M2M APPLICATIONS BACSOFT IOT PLATFORM: A COMPLETE SOLUTION FOR ADVANCED IOT AND M2M APPLICATIONS What Do You Need to Ensure a Successful Transition to IoT? As the business climate grows ever more competitive, industrial

More information

Product. DigitalAccess A Single Digital Solution for Online Banking, Mobile and Tablet

Product. DigitalAccess A Single Digital Solution for Online Banking, Mobile and Tablet Product DigitalAccess A Single Digital Solution for Online Banking, Mobile and Tablet Product The world is moving toward a new kind of financial services experience: the kind that serves customers in

More information

Contactless Toolkit for Acquirers

Contactless Toolkit for Acquirers MASTERCARD AND MAESTRO CONTACTLESS PAYMENTS Contactless Toolkit for Acquirers DECEMBER 2016 19.7% The Global Contactless Payment Market is poised to grow at a CAGR of around 19.7% over the next decade

More information

Securing Card Payments Challenges & Opportunities. Julie Hanson Senior Vice President, Card & Payment Products ICBA Bancard & TCM Bank, NA

Securing Card Payments Challenges & Opportunities. Julie Hanson Senior Vice President, Card & Payment Products ICBA Bancard & TCM Bank, NA Securing Card Payments Challenges & Opportunities Julie Hanson Senior Vice President, Card & Payment Products ICBA Bancard & TCM Bank, NA Agenda Securing Payments Landscape Chip Technology Tokenization

More information