SlideShare a Scribd company logo
1 of 19
Client authentication in e-
commerce solutions
What’s old, what’s new?
Janis Kulinš
Senior Solution Consultant
Tieto, ZSP Industry Solutions / ZSPFP Transaction Banking
janis.kulins@tieto.com
© Tieto Corporation
Content
• CNP(card not present) fraud
situation;
• 3D technology in general;
• 3DS v2 protocol
• Authentication methods
• New rules
3
© Tieto Corporation
CNP Fraud trends and stats
4
Source: Aite Group , Card-Not-Present Fraud in a Post-EMV Environment: Combating the Fraud Spike June 2014
• U.S. CNP Credit Card Fraud Losses, 2011 to e2018 (US$ billions)
© Tieto Corporation
What is 3D?
5
© Tieto Corporation
What is 3D?
6
• 3-D Secure is an XML-based protocol designed to be an additional security layer
for online credit and debit card transactions
• 3 domain architecture
• Acquirer (merchant, terminal owner)
• Issuer (card issuer)
• Interoperability domain (something in between)
© Tieto Corporation
How it works?
7
© Tieto Corporation
How it works?
8
© Tieto Corporation
How it really works?
9
© Tieto Corporation
3D Secure v1.*
10
• 3D v1 already 16 year old
• No solution for different platforms (non
browser)
• Need extra data for risk based decisions
• Security issues
• No tokenisation support
• No 3D for local payment schemes
• Conversion rate drop!
© Tieto Corporation
3D Secure v2.0
• The 3-D Secure authentication protocol supports both:
• Payment
• Non-Payment Authentication—Identity verification (!)
• The 3-D Secure authentication protocol can be both:
• App-based
• Browser-based
11
© Tieto Corporation
3D Secure v2.0
• Invisible and tightly integrated
• no redirects*, no popups
• Intelligent use of rich card data
• use available data to balancing risk/revenue
• Focus on behavioural patterns
• Biometrics is good, but BBA is better (?)
12
© Tieto Corporation
3D Secure v2.0
13
• Core specificaiton
• SDK specification
• Security requirements – IMPORTANT!
© Tieto Corporation
3D Secure v2.0 scheme
14
© Tieto Corporation
3D Secure v2.0. SDK
15
• Auth data
• Device info (shall be collected)
© Tieto Corporation
3D Secure v2.0 challenge types?
• Risk-based Authentication (RBA), with one of the
following approved challenge methods:
– One-time Password (via SMS or mobile app)
– Biometric Fingerprint Match (a Mastercard-qualified solution)
– Biometric Facial Recognition (a Mastercard-qualified solution)
• Biometric Fingerprint Match (a Mastercard-qualified solution)
• Biometric Facial Recognition (a Mastercard-qualified solution)
• Biometric Voice Recognition (when combined with device data and another
factor such as dynamic code)
• SMS with one-time use password
• Interactive Cards with PIN Pads
• Push Notification requesting Transaction Approval from Cardholder (out of band method)
• Handheld Token Generators, such as key fobs (when method is shared with online banking)
• Issuer Portal Verification Method, which requires the cardholder to log into the issuer site for verification
• Other solutions qualified within the Mastercard Qualified Authentication Technologies program
• Risk-based authentication, without a challenge
method.
16
© Tieto Corporation
3D Secure v.2.0 challenge types
17
http://www.europeanpaymentscouncil.eu/documents/EPC_Infographic_PSD2_March-2017_V2.pdf
• Common practice
• Formal int. policy
• PSD2
• Local policy
• FTKT
• Velocity/Behavior patterns
• Calculated risk?
© Tieto Corporation
Trends?
• «Invisible» payments
• Data consolidation (for processors)
• RBA
• Uber/Starbucks model
• Data tokenization
• HCE (* on file)
• PSD2
• Mobile payments
• New payment channels (WeChat Pay, Trustly)
• Fintechgration*
18
© Tieto Corporation
Questions?
19

More Related Content

What's hot

Lars Markull (Figo): Insights from a "Banking Service Provider"
Lars Markull (Figo): Insights from a "Banking Service Provider"Lars Markull (Figo): Insights from a "Banking Service Provider"
Lars Markull (Figo): Insights from a "Banking Service Provider"FinTechZone
 
Netcetera Innovation Summit 2016: The Past 12 Months - What's New & Exciting
Netcetera Innovation Summit 2016: The Past 12 Months - What's New & ExcitingNetcetera Innovation Summit 2016: The Past 12 Months - What's New & Exciting
Netcetera Innovation Summit 2016: The Past 12 Months - What's New & ExcitingNetcetera
 
EMV Secure Remote Commerce (SRC)
EMV Secure Remote Commerce (SRC)EMV Secure Remote Commerce (SRC)
EMV Secure Remote Commerce (SRC)Netcetera
 
Digital Payments - Netcetera Innovation Summit 2018
Digital Payments - Netcetera Innovation Summit 2018Digital Payments - Netcetera Innovation Summit 2018
Digital Payments - Netcetera Innovation Summit 2018Netcetera
 
Merchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote CommerceMerchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote CommerceNetcetera
 
Digital Payment Quo Vadis
Digital Payment Quo VadisDigital Payment Quo Vadis
Digital Payment Quo VadisNetcetera
 
3-D Secure 2.0
3-D Secure 2.03-D Secure 2.0
3-D Secure 2.0Netcetera
 
Seamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceSeamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceNetcetera
 
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Netcetera
 
PSD2 and 3DS2. The impact.
PSD2 and 3DS2. The impact.PSD2 and 3DS2. The impact.
PSD2 and 3DS2. The impact.Lewis Horder
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009wegdam
 
Bhadale group of companies- services catalogue for banking and financial sector
Bhadale group of companies- services catalogue for banking and financial sectorBhadale group of companies- services catalogue for banking and financial sector
Bhadale group of companies- services catalogue for banking and financial sectorVijayananda Mohire
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitAlan Quayle
 
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)Kullarat Phongsathaporn
 
Thoughts on the Future of Payments
Thoughts on the Future of PaymentsThoughts on the Future of Payments
Thoughts on the Future of PaymentsAinsley Ward
 
So you want to be an EMV Issuer...
So you want to be an EMV Issuer...So you want to be an EMV Issuer...
So you want to be an EMV Issuer...Ainsley Ward
 
Mastercard CMU Capstone Midsummer Presentation
Mastercard CMU Capstone Midsummer PresentationMastercard CMU Capstone Midsummer Presentation
Mastercard CMU Capstone Midsummer PresentationScott Leinweber
 
PSD2 - An Open Banking Revolution
PSD2 - An Open Banking RevolutionPSD2 - An Open Banking Revolution
PSD2 - An Open Banking RevolutionKillian Clifford
 

What's hot (19)

Lars Markull (Figo): Insights from a "Banking Service Provider"
Lars Markull (Figo): Insights from a "Banking Service Provider"Lars Markull (Figo): Insights from a "Banking Service Provider"
Lars Markull (Figo): Insights from a "Banking Service Provider"
 
Frictionless Adaption of PSD2 with WSO2
Frictionless Adaption of PSD2 with WSO2Frictionless Adaption of PSD2 with WSO2
Frictionless Adaption of PSD2 with WSO2
 
Netcetera Innovation Summit 2016: The Past 12 Months - What's New & Exciting
Netcetera Innovation Summit 2016: The Past 12 Months - What's New & ExcitingNetcetera Innovation Summit 2016: The Past 12 Months - What's New & Exciting
Netcetera Innovation Summit 2016: The Past 12 Months - What's New & Exciting
 
EMV Secure Remote Commerce (SRC)
EMV Secure Remote Commerce (SRC)EMV Secure Remote Commerce (SRC)
EMV Secure Remote Commerce (SRC)
 
Digital Payments - Netcetera Innovation Summit 2018
Digital Payments - Netcetera Innovation Summit 2018Digital Payments - Netcetera Innovation Summit 2018
Digital Payments - Netcetera Innovation Summit 2018
 
Merchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote CommerceMerchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote Commerce
 
Digital Payment Quo Vadis
Digital Payment Quo VadisDigital Payment Quo Vadis
Digital Payment Quo Vadis
 
3-D Secure 2.0
3-D Secure 2.03-D Secure 2.0
3-D Secure 2.0
 
Seamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceSeamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experience
 
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...
 
PSD2 and 3DS2. The impact.
PSD2 and 3DS2. The impact.PSD2 and 3DS2. The impact.
PSD2 and 3DS2. The impact.
 
Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009Consumer identity @ Tuesday Update on 1 December 2009
Consumer identity @ Tuesday Update on 1 December 2009
 
Bhadale group of companies- services catalogue for banking and financial sector
Bhadale group of companies- services catalogue for banking and financial sectorBhadale group of companies- services catalogue for banking and financial sector
Bhadale group of companies- services catalogue for banking and financial sector
 
A case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummitA case for identities - Etisalat, George Held at TADSummit
A case for identities - Etisalat, George Held at TADSummit
 
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
S2: FinTech Markets and Laws in Thailand (20 Oct 2021)
 
Thoughts on the Future of Payments
Thoughts on the Future of PaymentsThoughts on the Future of Payments
Thoughts on the Future of Payments
 
So you want to be an EMV Issuer...
So you want to be an EMV Issuer...So you want to be an EMV Issuer...
So you want to be an EMV Issuer...
 
Mastercard CMU Capstone Midsummer Presentation
Mastercard CMU Capstone Midsummer PresentationMastercard CMU Capstone Midsummer Presentation
Mastercard CMU Capstone Midsummer Presentation
 
PSD2 - An Open Banking Revolution
PSD2 - An Open Banking RevolutionPSD2 - An Open Banking Revolution
PSD2 - An Open Banking Revolution
 

Similar to "Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto Latvia at Authentication and Authorisation focused 53rd DevClub.lv

פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעZeev Shetach
 
R.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to payR.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to payMeet Magento Italy
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryGoutama Bachtiar
 
Digits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cDigits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cEtheralabs
 
PCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultPCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultJolin Löf
 
The Power of Picture for Customer Acquisition
The Power of Picture for Customer AcquisitionThe Power of Picture for Customer Acquisition
The Power of Picture for Customer AcquisitionMitek Systems
 
Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bankSteve Sidner
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.IRJET Journal
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low CostDonald Malloy
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overviewokrantz
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online bankingAbhilash Kallayil
 
motionQR - Citi Mobile Challenge Finalist
motionQR - Citi Mobile Challenge FinalistmotionQR - Citi Mobile Challenge Finalist
motionQR - Citi Mobile Challenge FinalistmotionQR
 

Similar to "Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto Latvia at Authentication and Authorisation focused 53rd DevClub.lv (20)

פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדעפתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
פתרונות ביומטריים - רשיונות נהיגה ביומטריים | קומדע
 
R.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to payR.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to pay
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
Digits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8cDigits ico-whitepaper-1v8c
Digits ico-whitepaper-1v8c
 
PCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsultPCI Solna EDB 101020 FortConsult
PCI Solna EDB 101020 FortConsult
 
The Power of Picture for Customer Acquisition
The Power of Picture for Customer AcquisitionThe Power of Picture for Customer Acquisition
The Power of Picture for Customer Acquisition
 
Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bank
 
PCI-DSS for IDRBT
PCI-DSS for IDRBTPCI-DSS for IDRBT
PCI-DSS for IDRBT
 
Loqr
LoqrLoqr
Loqr
 
EMV Credit Card Technology in Parking
EMV Credit Card Technology in ParkingEMV Credit Card Technology in Parking
EMV Credit Card Technology in Parking
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
OCR DETECTION AND BIOMETRIC AUTHENTICATED CREDIT CARD PAYMENT SYSTEM.
 
Security and Authentication at a Low Cost
Security and Authentication at a Low CostSecurity and Authentication at a Low Cost
Security and Authentication at a Low Cost
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Proposal
ProposalProposal
Proposal
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online banking
 
What is A Smart Card
What is A Smart CardWhat is A Smart Card
What is A Smart Card
 
Kona SL Profile
Kona SL ProfileKona SL Profile
Kona SL Profile
 
motionQR - Citi Mobile Challenge Finalist
motionQR - Citi Mobile Challenge FinalistmotionQR - Citi Mobile Challenge Finalist
motionQR - Citi Mobile Challenge Finalist
 

More from DevClub_lv

Fine-tuning Large Language Models by Dmitry Balabka
Fine-tuning Large Language Models by Dmitry BalabkaFine-tuning Large Language Models by Dmitry Balabka
Fine-tuning Large Language Models by Dmitry BalabkaDevClub_lv
 
"Infrastructure and AWS at Scale: The story of Posti" by Goran Gjorgievski @ ...
"Infrastructure and AWS at Scale: The story of Posti" by Goran Gjorgievski @ ..."Infrastructure and AWS at Scale: The story of Posti" by Goran Gjorgievski @ ...
"Infrastructure and AWS at Scale: The story of Posti" by Goran Gjorgievski @ ...DevClub_lv
 
From 50 to 500 product engineers – data-driven approach to building impactful...
From 50 to 500 product engineers – data-driven approach to building impactful...From 50 to 500 product engineers – data-driven approach to building impactful...
From 50 to 500 product engineers – data-driven approach to building impactful...DevClub_lv
 
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...DevClub_lv
 
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...DevClub_lv
 
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...DevClub_lv
 
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...DevClub_lv
 
SRE (service reliability engineer) on big DevOps platform running on the clou...
SRE (service reliability engineer) on big DevOps platform running on the clou...SRE (service reliability engineer) on big DevOps platform running on the clou...
SRE (service reliability engineer) on big DevOps platform running on the clou...DevClub_lv
 
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...DevClub_lv
 
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...DevClub_lv
 
Building resilient frontend architecture by Monica Lent at FrontCon 2019
Building resilient frontend architecture by Monica Lent at FrontCon 2019Building resilient frontend architecture by Monica Lent at FrontCon 2019
Building resilient frontend architecture by Monica Lent at FrontCon 2019DevClub_lv
 
Things that every JavaScript developer should know by Rachel Appel at FrontCo...
Things that every JavaScript developer should know by Rachel Appel at FrontCo...Things that every JavaScript developer should know by Rachel Appel at FrontCo...
Things that every JavaScript developer should know by Rachel Appel at FrontCo...DevClub_lv
 
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...DevClub_lv
 
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019DevClub_lv
 
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...DevClub_lv
 
Bridging the gap between UX and development - A Storybook by Marko Letic at F...
Bridging the gap between UX and development - A Storybook by Marko Letic at F...Bridging the gap between UX and development - A Storybook by Marko Letic at F...
Bridging the gap between UX and development - A Storybook by Marko Letic at F...DevClub_lv
 
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019DevClub_lv
 
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...DevClub_lv
 
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019DevClub_lv
 
Managing State in React Apps with RxJS by James Wright at FrontCon 2019
Managing State in React Apps with RxJS by James Wright at FrontCon 2019Managing State in React Apps with RxJS by James Wright at FrontCon 2019
Managing State in React Apps with RxJS by James Wright at FrontCon 2019DevClub_lv
 

More from DevClub_lv (20)

Fine-tuning Large Language Models by Dmitry Balabka
Fine-tuning Large Language Models by Dmitry BalabkaFine-tuning Large Language Models by Dmitry Balabka
Fine-tuning Large Language Models by Dmitry Balabka
 
"Infrastructure and AWS at Scale: The story of Posti" by Goran Gjorgievski @ ...
"Infrastructure and AWS at Scale: The story of Posti" by Goran Gjorgievski @ ..."Infrastructure and AWS at Scale: The story of Posti" by Goran Gjorgievski @ ...
"Infrastructure and AWS at Scale: The story of Posti" by Goran Gjorgievski @ ...
 
From 50 to 500 product engineers – data-driven approach to building impactful...
From 50 to 500 product engineers – data-driven approach to building impactful...From 50 to 500 product engineers – data-driven approach to building impactful...
From 50 to 500 product engineers – data-driven approach to building impactful...
 
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...
Why is it so complex to accept a payment? by Dmitry Buzdin from A-Heads Consu...
 
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...
Do we need DDD? by Jurijs Čudnovskis from “Craftsmans Passion” at Fintech foc...
 
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
 
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...
Using Azure Managed Identities for your App Services by Jan de Vries from 4Do...
 
SRE (service reliability engineer) on big DevOps platform running on the clou...
SRE (service reliability engineer) on big DevOps platform running on the clou...SRE (service reliability engineer) on big DevOps platform running on the clou...
SRE (service reliability engineer) on big DevOps platform running on the clou...
 
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
Emergence of IOT & Cloud – Azure by Narendra Sharma at Cloud focused 76th Dev...
 
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...
Cross Platform Mobile Development using Flutter by Wei Meng Lee at Mobile foc...
 
Building resilient frontend architecture by Monica Lent at FrontCon 2019
Building resilient frontend architecture by Monica Lent at FrontCon 2019Building resilient frontend architecture by Monica Lent at FrontCon 2019
Building resilient frontend architecture by Monica Lent at FrontCon 2019
 
Things that every JavaScript developer should know by Rachel Appel at FrontCo...
Things that every JavaScript developer should know by Rachel Appel at FrontCo...Things that every JavaScript developer should know by Rachel Appel at FrontCo...
Things that every JavaScript developer should know by Rachel Appel at FrontCo...
 
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
In the Trenches During a Software Supply Chain Attack by Mitch Denny at Front...
 
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019
Software Decision Making in Terms of Uncertainty by Ziv Levy at FrontCon 2019
 
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...
V8 by example: A journey through the compilation pipeline by Ujjwas Sharma at...
 
Bridging the gap between UX and development - A Storybook by Marko Letic at F...
Bridging the gap between UX and development - A Storybook by Marko Letic at F...Bridging the gap between UX and development - A Storybook by Marko Letic at F...
Bridging the gap between UX and development - A Storybook by Marko Letic at F...
 
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019
Case-study: Frontend in Cybersecurity by Ruslan Zavacky by FrontCon 2019
 
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...
Building next generation PWA e-commerce frontend by Raivis Dejus at FrontCon ...
 
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019
Parcel – your next web application bundler? by Janis Koselevs at FrontCon 2019
 
Managing State in React Apps with RxJS by James Wright at FrontCon 2019
Managing State in React Apps with RxJS by James Wright at FrontCon 2019Managing State in React Apps with RxJS by James Wright at FrontCon 2019
Managing State in React Apps with RxJS by James Wright at FrontCon 2019
 

Recently uploaded

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 

Recently uploaded (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 

"Client authentication in e-commerce solutions" by Jānis Kūliņš from Tieto Latvia at Authentication and Authorisation focused 53rd DevClub.lv

  • 1. Client authentication in e- commerce solutions What’s old, what’s new? Janis Kulinš Senior Solution Consultant Tieto, ZSP Industry Solutions / ZSPFP Transaction Banking janis.kulins@tieto.com
  • 3. Content • CNP(card not present) fraud situation; • 3D technology in general; • 3DS v2 protocol • Authentication methods • New rules 3
  • 4. © Tieto Corporation CNP Fraud trends and stats 4 Source: Aite Group , Card-Not-Present Fraud in a Post-EMV Environment: Combating the Fraud Spike June 2014 • U.S. CNP Credit Card Fraud Losses, 2011 to e2018 (US$ billions)
  • 6. © Tieto Corporation What is 3D? 6 • 3-D Secure is an XML-based protocol designed to be an additional security layer for online credit and debit card transactions • 3 domain architecture • Acquirer (merchant, terminal owner) • Issuer (card issuer) • Interoperability domain (something in between)
  • 9. © Tieto Corporation How it really works? 9
  • 10. © Tieto Corporation 3D Secure v1.* 10 • 3D v1 already 16 year old • No solution for different platforms (non browser) • Need extra data for risk based decisions • Security issues • No tokenisation support • No 3D for local payment schemes • Conversion rate drop!
  • 11. © Tieto Corporation 3D Secure v2.0 • The 3-D Secure authentication protocol supports both: • Payment • Non-Payment Authentication—Identity verification (!) • The 3-D Secure authentication protocol can be both: • App-based • Browser-based 11
  • 12. © Tieto Corporation 3D Secure v2.0 • Invisible and tightly integrated • no redirects*, no popups • Intelligent use of rich card data • use available data to balancing risk/revenue • Focus on behavioural patterns • Biometrics is good, but BBA is better (?) 12
  • 13. © Tieto Corporation 3D Secure v2.0 13 • Core specificaiton • SDK specification • Security requirements – IMPORTANT!
  • 14. © Tieto Corporation 3D Secure v2.0 scheme 14
  • 15. © Tieto Corporation 3D Secure v2.0. SDK 15 • Auth data • Device info (shall be collected)
  • 16. © Tieto Corporation 3D Secure v2.0 challenge types? • Risk-based Authentication (RBA), with one of the following approved challenge methods: – One-time Password (via SMS or mobile app) – Biometric Fingerprint Match (a Mastercard-qualified solution) – Biometric Facial Recognition (a Mastercard-qualified solution) • Biometric Fingerprint Match (a Mastercard-qualified solution) • Biometric Facial Recognition (a Mastercard-qualified solution) • Biometric Voice Recognition (when combined with device data and another factor such as dynamic code) • SMS with one-time use password • Interactive Cards with PIN Pads • Push Notification requesting Transaction Approval from Cardholder (out of band method) • Handheld Token Generators, such as key fobs (when method is shared with online banking) • Issuer Portal Verification Method, which requires the cardholder to log into the issuer site for verification • Other solutions qualified within the Mastercard Qualified Authentication Technologies program • Risk-based authentication, without a challenge method. 16
  • 17. © Tieto Corporation 3D Secure v.2.0 challenge types 17 http://www.europeanpaymentscouncil.eu/documents/EPC_Infographic_PSD2_March-2017_V2.pdf • Common practice • Formal int. policy • PSD2 • Local policy • FTKT • Velocity/Behavior patterns • Calculated risk?
  • 18. © Tieto Corporation Trends? • «Invisible» payments • Data consolidation (for processors) • RBA • Uber/Starbucks model • Data tokenization • HCE (* on file) • PSD2 • Mobile payments • New payment channels (WeChat Pay, Trustly) • Fintechgration* 18

Editor's Notes

  1. Estimated CNP fraud rates after EMV adoption (just for trends)…WHAT TO DO, How to Cobat this?
  2. No information..different Names. DROŠIE PIRKUMI INTERNETĀ (SWED) 3d secure (SEB) E-drošība (Nordea)
  3. First developed by Visa..tha adp[ted bu other schemes. Most recent 2010 Nov Amex safekey. Differences mainli in way how UCAF is generated: MC – AAV, Visa CAVV, Amex AeVV Core specfication….Visa document
  4. Problems. Protocol ownership Cannot share infrastructure with local schemes or not payment products
  5. V 1.0 16 years old Frustrated with password, merchants want less friction during payment; For smart device
  6. App-based—Authentication during a transaction on a Consumer Device that originates from an App provided by a registered agent 3DS Requestor (merchant, digital wallet, et al). For example, an e-commerce transaction originating during a check-out process within a merchant’s app. Browser-based—Authentication during a transaction on a Consumer device that originates from a website utilising a browser. For example, an e-commerce transaction originating during a check-out process within a website on a Consumer Device. •Browser experience for web and mobile/smart device •User interface and experience •Non-browser experience, such as in application •Tokenization, ID&V, and non-payment user authentication •The option to provide additional data to enhance user authentication and ease risk based authentication decisions •Security vulnerabilities in some message flows (such as redirect/man in the middle) •Enhanced flows to reduced friction •Extensions to allow future flexibility and scheme specific needs •Digital wallet integration of EMV 3DS 2.0
  7. Invisible and tightly integrated – no pop-ups and no extra steps. Shopping card abandonment rates and lost conversions under 1.0 make this clear. Intelligent use of rich card data – it should be used to assess actual risk, not be more information the user needs to manually validate at the time of transaction. Focus on behavioral – measure the things that are really impossible to fake. Biometric is a good start, but behavioral-based authentication is better.
  8. SEC req is very big deal. Should come form schemes itself.
  9. Requestor (sort of MPI) 3DS Client – 3DS APP SDK (app based) Browser based - (integrates with Requestor site); 3DS server – interface only ( collects data, makes SSL, validate messages etc) 3DS Integrator (3DS server + 3DS Client)! Sort of full MPI which may porvid SDK for mercahnts! Frictionless flow (AReq, ARes) -
  10. 30 eur limit, on us trn Biometrics…any examples??? Wife? With PSD2 they’re introducing Account Information Service Provider or AISP’s, which will allo With PSD2, the Directive will allow retailers to ‘ask’ consumers for permission to use your bank details. Once you give permission, the retailer will receive the payment directly from your bank – no intermediaries The direct connection between retailers and banks will be enabled using Application Programming Interface or APIs for short The use of API’s is exciting because it enables companies (innovative companies) to connect to financial institutions directl For those of you that maybe multi-banked – i.e. bank accounts with multiple banks – we currently have to access each bank website separatelyWith PSD2 they’re introducing Account Information Service Provider or AISP’s, which will allow you to view all of your multi-bank details in 1 portal.
  11. 37% - 50% - 2017 market of payments! Another interesting area to watch is the growth of European P2P payment apps such as Bunq, MobilePay, and Swish, which may follow the route of WeChat Pay and evolve into B2C mobile wallets. Frictionless payments – amazon go (real life) Account Servicing Payment Service Provider (ASPSP)These are the banks that hold customer accounts, and are required by PSD2 to allow access to those accounts to TPPs through an open application program interface (API).Any EU Bank Payment Initiation Service Provider (PISP)With approval from the customer (often referred to as the Payment Service User, or PSU), PISPs have the ability to initiate payments on the customer’s behalf by accessing the customer’s accounts through an ASPSP’s open API. Typically, PISPs focus on e-commerce transactions, linking the merchant to a customer’s account.Sofort, Trustly, iDEALAccount Information Service Provider (AISP)AISPs act as aggregators of a consenting customer’s financial information across all accounts and financial services institutions, enabling the display of that aggregated information on some kind of customer-facing dashboard.Mint, Yodlee, Money Dashboard
  12. http://ismycreditacardstolen.com real source of danger?