SlideShare a Scribd company logo
1 of 56
 
Agenda
PAYMENT & SECURITY TRENDS
Payments: The story so far… “… Globally, the drive to increase (card) payments efficiency and security is relentless…” “… Globalisation is increasingly emphasising the need for widely accessible, seamless, & secure ways of effecting non-cash payments to facilitate consumer spending, and to reduce fraud and money laundering.…” “… More efficient, effective systems could also help lessen systemic risk & potentially provide a source of additional retail revenue for banks.…”
Vietnam embraces the electronic era “… Vietnam is regarded by the global banking industry as one of the most fertile growth hotspots in the world, particularly for cards and electronic payments….” VRL Financial News,  October 2009
Security: The story so far… “… increased incidences of ATM and card  skimming.…” “… the need to reassure cardholders about the safety and security of card transactions.…” “ Statistics from 2007 show the level of payment card fraud in Vietnam stood at 0.15 percent of total card payments, a much higher level than the global average of 0.06 percent.”
E2EE: What is it? Computer Desktop Encyclopedia “… is defined as the continuous protection of the confidentiality and integrity of transmitted information by encrypting it at the origin and decrypting at its destination.…”
E2EE: The story so far… Smart Card Alliance  Sept 2009
KEY CONCEPTS OF TLE
In cryptography,  encryption , is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is  encrypted  information (Wikipedia) en·cryp·tion  /-'krip-sh&n/
MAC-ing is the process of “fingerprinting” data to allow any tampering to be detected, where the fingerprint is encrypted so only Sender/Receiver can form a real MAC and thus, allowing the receiver to authenticate & verify the message Message Authentication Code
THE MALAYSIAN EXPERIENCE
Real Tapping Threats
Wire tapping threats
A brief look at history…
The Line Encryption Working Group
Design Parameters
Key  Considerations
[object Object],[object Object],Minimum Data Encryption Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MAC algorithm ENC algorithm Key Differentiation Key Usage Key Storage ENC Data elements 2 2 4 2 4 3
General Approaches Host-based Host HSM NAC NAC-based Host Interception-based Host NAC SNAC NAC NAC NAC NAC NAC
Data Center Host NAC TLE: Typical Transaction Flow Terminal Encrypt selected fields in transaction 1 Send to Host 4 Decrypt & validate transaction 2 Reform to original message 3 Response from Host 5 Encrypt & MAC response 6 Decrypt & validate response message 7
THE RESULTS
The Results… Source: Visa VPSS Payment Security Bulettin, 2006
The Results… Source: Visa VPSS Payment Security Bulettin, 2006
The Results… Source: Visa VPSS Payment Security Bulettin, 2006
The Results… Source: Visa VPSS Payment Security Bulettin, 2006
The Results…
Payments: The story today… Source:  BNM, 2009 Financial Stability and Payment Systems Report 2008
Payments: The story today “… (card fraud) losses continued to be insignificant, accounting for less than 0.04% of total card transactions during the year.”
PAYMENT SECURITY MYTHS
Encryption Myths
Summary: Considerations for TLE Addresses all threats Addresses Implementation issues Addresses Deployment Issues Addresses Administration Issues Multi-channel & multi-device Support Remote Key Injection Vendor Independence Performance  Cost-Effective
Additional References ,[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT IS NETMATRIX TLE?
NetMATRIX TLE (Terminal Line Encryption) is a plug-and-play solution for banks who wish to introduce  terminal line encryption  into their POS network infrastructure Net MATRIX Terminal Line Encryption
NetMATRIX TLE: Approach Host-based Host HSM NAC NAC-based Host Interception-based Host NAC SNAC NAC NAC NAC NAC NAC
Key  Considerations
Key Features
Key Features
NETMATRIX ARCHITECTURE
Credit Card Host NII: 160 “ Typical” Transaction Flow Issuing  Bank Host Acquiring  Bank EDC Terminals Switching NAC Remote NAC Remote NAC Net MATRIX Acquiring Host 160 Message
Credit Card Host NII: 160 NetMATRIX TLE NII: 161 Encrypted Transaction Flow Issuing  Bank Host Net MATRIX Acquiring  Bank Acquiring Host EDC Terminals Switching NAC Remote NAC Remote NAC 161 Enc Message 160 Enc Message
Encrypted Transaction Flow II Credit Card Host NII: 160 NetMATRIX TLE NII: 161 Net MATRIX Acquiring  Bank Acquiring Host Issuing  Bank Host EDC Terminals Switching NAC Remote NAC Remote NAC 161 Enc Message 160 Enc Message
Data Center Host NAC NetMATRIX: How it Works Terminal Encrypt selected fields in transaction 1 Send to Host 4 Decrypt & validate transaction 2 Reform to original message 3 Response from Host 5 Encrypt & MAC response 6 Decrypt & validate response message 7
Efficiency: Clustering & Load-Balancing Load Balancing Host NAC TCP/IP Cluster
Business Continuity: Auto-Failover TCP/IP Failover Host NAC TCP/IP Cluster
GHL SYSTEMS
Our Mission To be the leading end-to-end  payment services enabler  in the Asia-Pacific region,  deploying world-class  payment infrastructure, technology and services
Products & Services offerings World-class payment infrastructure, services and technology: Transaction routers & concentrators Terminal Line Encryption technologies Loyalty & Online Payment solutions Smartcard technologies 24x7 Managed Network Services Consulting Services Terminal Management Solutions Contactless Payments
Complete Payment Network Integration
Addressing Strategic Needs
GHL Systems Regional Presence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Accolades & Accomplishments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malaysia Singapore Indonesia Vietnam Brunei Customer References
Philippines China / Hong Kong Middle East Romania Asia/Pacific Australia / New Zealand Thailand Customer References
Thank you Alex Tan Vice President – International Sales [email_address]

More Related Content

What's hot

Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaSunil Kumar R
 
SPIFFE Meetup Tokyo #2 - Attestation Internals in SPIRE - Shingo Omura
SPIFFE Meetup Tokyo #2 - Attestation Internals in SPIRE - Shingo OmuraSPIFFE Meetup Tokyo #2 - Attestation Internals in SPIRE - Shingo Omura
SPIFFE Meetup Tokyo #2 - Attestation Internals in SPIRE - Shingo OmuraPreferred Networks
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in DepthDilum Bandara
 
01 - Introduction to Hyperledger : A Blockchain Technology for Business
01 - Introduction to Hyperledger : A Blockchain Technology for Business01 - Introduction to Hyperledger : A Blockchain Technology for Business
01 - Introduction to Hyperledger : A Blockchain Technology for BusinessMerlec Mpyana
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh clevernetsystemsgeneva
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket LayerPina Parmar
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentationkartikeya upadhyay
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )Monodip Singha Roy
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
An Identity Governance and Administration (IGA) quick start to help you prepa...
An Identity Governance and Administration (IGA) quick start to help you prepa...An Identity Governance and Administration (IGA) quick start to help you prepa...
An Identity Governance and Administration (IGA) quick start to help you prepa...Aldo Pietropaolo
 
Nice solutions guide_v1.0
Nice solutions guide_v1.0Nice solutions guide_v1.0
Nice solutions guide_v1.0Ranjit Patel
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key InfrastructureTheo Gravity
 
SSL Communication and Mutual Authentication
SSL Communication and Mutual AuthenticationSSL Communication and Mutual Authentication
SSL Communication and Mutual AuthenticationCleo
 

What's hot (20)

HSM Basic Training
HSM Basic TrainingHSM Basic Training
HSM Basic Training
 
Secure Coding and Threat Modeling
Secure Coding and Threat ModelingSecure Coding and Threat Modeling
Secure Coding and Threat Modeling
 
Secure Your Encryption with HSM
Secure Your Encryption with HSMSecure Your Encryption with HSM
Secure Your Encryption with HSM
 
Advanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using JavaAdvanced Encryption Standard (AES) Implementaion using Java
Advanced Encryption Standard (AES) Implementaion using Java
 
Public key Infrastructure (PKI)
Public key Infrastructure (PKI)Public key Infrastructure (PKI)
Public key Infrastructure (PKI)
 
SPIFFE Meetup Tokyo #2 - Attestation Internals in SPIRE - Shingo Omura
SPIFFE Meetup Tokyo #2 - Attestation Internals in SPIRE - Shingo OmuraSPIFFE Meetup Tokyo #2 - Attestation Internals in SPIRE - Shingo Omura
SPIFFE Meetup Tokyo #2 - Attestation Internals in SPIRE - Shingo Omura
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
01 - Introduction to Hyperledger : A Blockchain Technology for Business
01 - Introduction to Hyperledger : A Blockchain Technology for Business01 - Introduction to Hyperledger : A Blockchain Technology for Business
01 - Introduction to Hyperledger : A Blockchain Technology for Business
 
WPA2
WPA2WPA2
WPA2
 
Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh Présentation et démo ELK/SIEM/Wazuh
Présentation et démo ELK/SIEM/Wazuh
 
Secure Socket Layer
Secure Socket LayerSecure Socket Layer
Secure Socket Layer
 
Hash crypto
Hash cryptoHash crypto
Hash crypto
 
Audio steganography project presentation
Audio steganography project presentationAudio steganography project presentation
Audio steganography project presentation
 
DES
DESDES
DES
 
SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )SECURE SOCKET LAYER ( WEB SECURITY )
SECURE SOCKET LAYER ( WEB SECURITY )
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
An Identity Governance and Administration (IGA) quick start to help you prepa...
An Identity Governance and Administration (IGA) quick start to help you prepa...An Identity Governance and Administration (IGA) quick start to help you prepa...
An Identity Governance and Administration (IGA) quick start to help you prepa...
 
Nice solutions guide_v1.0
Nice solutions guide_v1.0Nice solutions guide_v1.0
Nice solutions guide_v1.0
 
Introduction to Public Key Infrastructure
Introduction to Public Key InfrastructureIntroduction to Public Key Infrastructure
Introduction to Public Key Infrastructure
 
SSL Communication and Mutual Authentication
SSL Communication and Mutual AuthenticationSSL Communication and Mutual Authentication
SSL Communication and Mutual Authentication
 

Viewers also liked

Millennials: The young generation shaping the future
Millennials: The young generation shaping the future Millennials: The young generation shaping the future
Millennials: The young generation shaping the future DigitasLBi Nordics
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationGovindarrajan NV
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explainedTodd Merrill
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryptionVenkatesh Kariappa
 
End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsJeff Lambert
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemSyuan Wang
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityVuz Dở Hơi
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingLennon808
 

Viewers also liked (8)

Millennials: The young generation shaping the future
Millennials: The young generation shaping the future Millennials: The young generation shaping the future
Millennials: The young generation shaping the future
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryption
 
End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed Applications
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 

Similar to NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES, End-to-end encryption (E2EE), Multiple MACing algorithms, Local and remote secure key injection

Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Amila Gamanayake
 
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...Priyanka Aash
 
Furture_of_banking
Furture_of_bankingFurture_of_banking
Furture_of_bankingrclalwani
 
E Finance Er. S Sood
E Finance Er. S SoodE Finance Er. S Sood
E Finance Er. S Soodshart sood
 
E Finance Er. S Sood
E Finance Er. S SoodE Finance Er. S Sood
E Finance Er. S Soodshart sood
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - finalAlex Tan
 
Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bankSteve Sidner
 
7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / WebinarIngenico Group
 
EMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of SaleEMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of Sale- Mark - Fullbright
 
Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Vladislav Solodkiy
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEGreg Stone
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011jhatch9418
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment SecurityTom Cooley
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsMichelle Morgan-Nelsen
 

Similar to NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES, End-to-end encryption (E2EE), Multiple MACing algorithms, Local and remote secure key injection (20)

Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)
 
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
 
EMV Credit Card Technology in Parking
EMV Credit Card Technology in ParkingEMV Credit Card Technology in Parking
EMV Credit Card Technology in Parking
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 
Jaiyadav
JaiyadavJaiyadav
Jaiyadav
 
Jaiyadav
JaiyadavJaiyadav
Jaiyadav
 
Furtureofbanking
FurtureofbankingFurtureofbanking
Furtureofbanking
 
Furture_of_banking
Furture_of_bankingFurture_of_banking
Furture_of_banking
 
E Finance Er. S Sood
E Finance Er. S SoodE Finance Er. S Sood
E Finance Er. S Sood
 
E Finance Er. S Sood
E Finance Er. S SoodE Finance Er. S Sood
E Finance Er. S Sood
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - final
 
Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bank
 
7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar
 
EMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of SaleEMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of Sale
 
Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
 

More from Alex Tan

NetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL SystemsNetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL SystemsAlex Tan
 
ATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless ConnectivityATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless ConnectivityAlex Tan
 
Netaccess introduction
Netaccess introductionNetaccess introduction
Netaccess introductionAlex Tan
 
Net Access L 300 Training Slides
Net Access L 300 Training SlidesNet Access L 300 Training Slides
Net Access L 300 Training SlidesAlex Tan
 
Net Access L 200 Training Slides
Net Access L 200 Training SlidesNet Access L 200 Training Slides
Net Access L 200 Training SlidesAlex Tan
 
Net access web page configurations
Net access web page configurationsNet access web page configurations
Net access web page configurationsAlex Tan
 
Ghl systems net access w & n series presentation sept 2009 for wnb
Ghl systems net access w & n series presentation   sept 2009 for wnbGhl systems net access w & n series presentation   sept 2009 for wnb
Ghl systems net access w & n series presentation sept 2009 for wnbAlex Tan
 
L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...Alex Tan
 
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...Alex Tan
 
Ghl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_studyGhl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_studyAlex Tan
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...Alex Tan
 
Net access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentationNet access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentationAlex Tan
 
Ghl systems may 2010
Ghl systems may 2010Ghl systems may 2010
Ghl systems may 2010Alex Tan
 
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010Alex Tan
 
Ghl success stories retail series aug 2010
Ghl success stories   retail series aug 2010Ghl success stories   retail series aug 2010
Ghl success stories retail series aug 2010Alex Tan
 
Ghl success stories transportation series - mar 2010
Ghl success stories   transportation series - mar 2010Ghl success stories   transportation series - mar 2010
Ghl success stories transportation series - mar 2010Alex Tan
 
Ghl systems customer success story zouk kl
Ghl systems customer success story  zouk klGhl systems customer success story  zouk kl
Ghl systems customer success story zouk klAlex Tan
 
Ghl systems customer success story shoemart
Ghl systems customer success story shoemartGhl systems customer success story shoemart
Ghl systems customer success story shoemartAlex Tan
 
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...Alex Tan
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...Alex Tan
 

More from Alex Tan (20)

NetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL SystemsNetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL Systems
 
ATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless ConnectivityATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless Connectivity
 
Netaccess introduction
Netaccess introductionNetaccess introduction
Netaccess introduction
 
Net Access L 300 Training Slides
Net Access L 300 Training SlidesNet Access L 300 Training Slides
Net Access L 300 Training Slides
 
Net Access L 200 Training Slides
Net Access L 200 Training SlidesNet Access L 200 Training Slides
Net Access L 200 Training Slides
 
Net access web page configurations
Net access web page configurationsNet access web page configurations
Net access web page configurations
 
Ghl systems net access w & n series presentation sept 2009 for wnb
Ghl systems net access w & n series presentation   sept 2009 for wnbGhl systems net access w & n series presentation   sept 2009 for wnb
Ghl systems net access w & n series presentation sept 2009 for wnb
 
L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...
 
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
 
Ghl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_studyGhl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_study
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
 
Net access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentationNet access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentation
 
Ghl systems may 2010
Ghl systems may 2010Ghl systems may 2010
Ghl systems may 2010
 
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
 
Ghl success stories retail series aug 2010
Ghl success stories   retail series aug 2010Ghl success stories   retail series aug 2010
Ghl success stories retail series aug 2010
 
Ghl success stories transportation series - mar 2010
Ghl success stories   transportation series - mar 2010Ghl success stories   transportation series - mar 2010
Ghl success stories transportation series - mar 2010
 
Ghl systems customer success story zouk kl
Ghl systems customer success story  zouk klGhl systems customer success story  zouk kl
Ghl systems customer success story zouk kl
 
Ghl systems customer success story shoemart
Ghl systems customer success story shoemartGhl systems customer success story shoemart
Ghl systems customer success story shoemart
 
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
 

Recently uploaded

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 

NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES, End-to-end encryption (E2EE), Multiple MACing algorithms, Local and remote secure key injection

  • 1.  
  • 4. Payments: The story so far… “… Globally, the drive to increase (card) payments efficiency and security is relentless…” “… Globalisation is increasingly emphasising the need for widely accessible, seamless, & secure ways of effecting non-cash payments to facilitate consumer spending, and to reduce fraud and money laundering.…” “… More efficient, effective systems could also help lessen systemic risk & potentially provide a source of additional retail revenue for banks.…”
  • 5. Vietnam embraces the electronic era “… Vietnam is regarded by the global banking industry as one of the most fertile growth hotspots in the world, particularly for cards and electronic payments….” VRL Financial News, October 2009
  • 6. Security: The story so far… “… increased incidences of ATM and card skimming.…” “… the need to reassure cardholders about the safety and security of card transactions.…” “ Statistics from 2007 show the level of payment card fraud in Vietnam stood at 0.15 percent of total card payments, a much higher level than the global average of 0.06 percent.”
  • 7. E2EE: What is it? Computer Desktop Encyclopedia “… is defined as the continuous protection of the confidentiality and integrity of transmitted information by encrypting it at the origin and decrypting at its destination.…”
  • 8. E2EE: The story so far… Smart Card Alliance Sept 2009
  • 10. In cryptography, encryption , is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (Wikipedia) en·cryp·tion /-'krip-sh&n/
  • 11. MAC-ing is the process of “fingerprinting” data to allow any tampering to be detected, where the fingerprint is encrypted so only Sender/Receiver can form a real MAC and thus, allowing the receiver to authenticate & verify the message Message Authentication Code
  • 15. A brief look at history…
  • 16. The Line Encryption Working Group
  • 19.
  • 20. General Approaches Host-based Host HSM NAC NAC-based Host Interception-based Host NAC SNAC NAC NAC NAC NAC NAC
  • 21. Data Center Host NAC TLE: Typical Transaction Flow Terminal Encrypt selected fields in transaction 1 Send to Host 4 Decrypt & validate transaction 2 Reform to original message 3 Response from Host 5 Encrypt & MAC response 6 Decrypt & validate response message 7
  • 23. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  • 24. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  • 25. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  • 26. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  • 28. Payments: The story today… Source: BNM, 2009 Financial Stability and Payment Systems Report 2008
  • 29. Payments: The story today “… (card fraud) losses continued to be insignificant, accounting for less than 0.04% of total card transactions during the year.”
  • 32. Summary: Considerations for TLE Addresses all threats Addresses Implementation issues Addresses Deployment Issues Addresses Administration Issues Multi-channel & multi-device Support Remote Key Injection Vendor Independence Performance Cost-Effective
  • 33.
  • 35. NetMATRIX TLE (Terminal Line Encryption) is a plug-and-play solution for banks who wish to introduce terminal line encryption into their POS network infrastructure Net MATRIX Terminal Line Encryption
  • 36. NetMATRIX TLE: Approach Host-based Host HSM NAC NAC-based Host Interception-based Host NAC SNAC NAC NAC NAC NAC NAC
  • 41. Credit Card Host NII: 160 “ Typical” Transaction Flow Issuing Bank Host Acquiring Bank EDC Terminals Switching NAC Remote NAC Remote NAC Net MATRIX Acquiring Host 160 Message
  • 42. Credit Card Host NII: 160 NetMATRIX TLE NII: 161 Encrypted Transaction Flow Issuing Bank Host Net MATRIX Acquiring Bank Acquiring Host EDC Terminals Switching NAC Remote NAC Remote NAC 161 Enc Message 160 Enc Message
  • 43. Encrypted Transaction Flow II Credit Card Host NII: 160 NetMATRIX TLE NII: 161 Net MATRIX Acquiring Bank Acquiring Host Issuing Bank Host EDC Terminals Switching NAC Remote NAC Remote NAC 161 Enc Message 160 Enc Message
  • 44. Data Center Host NAC NetMATRIX: How it Works Terminal Encrypt selected fields in transaction 1 Send to Host 4 Decrypt & validate transaction 2 Reform to original message 3 Response from Host 5 Encrypt & MAC response 6 Decrypt & validate response message 7
  • 45. Efficiency: Clustering & Load-Balancing Load Balancing Host NAC TCP/IP Cluster
  • 46. Business Continuity: Auto-Failover TCP/IP Failover Host NAC TCP/IP Cluster
  • 48. Our Mission To be the leading end-to-end payment services enabler in the Asia-Pacific region, deploying world-class payment infrastructure, technology and services
  • 49. Products & Services offerings World-class payment infrastructure, services and technology: Transaction routers & concentrators Terminal Line Encryption technologies Loyalty & Online Payment solutions Smartcard technologies 24x7 Managed Network Services Consulting Services Terminal Management Solutions Contactless Payments
  • 52.
  • 53.
  • 54. Malaysia Singapore Indonesia Vietnam Brunei Customer References
  • 55. Philippines China / Hong Kong Middle East Romania Asia/Pacific Australia / New Zealand Thailand Customer References
  • 56. Thank you Alex Tan Vice President – International Sales [email_address]

Editor's Notes

  1. Mixed environment Mix of encrypting / non-encrypting terminals Different terminal vendors Different terminal capabilities Coexistence of multiple encryption schemes Deployment Issues Terminal Key Injection Phased Rollout Security Holistic treatment of Security? Procedures, Processes, technology Addresses other possible attacks? Understanding of possible attacks & risks? Terminal key storage? Performance Scalability Impact on host performance Impact on terminal performance Terminal Implementation Simplicity of terminal implementation Multi vendor implementation Impact on current infrastructure Host changes? Network & terminal changes? Stability? Robustness? Performance? Response time? Impact of future changes Changes in message formats Different message versions Shared Network Tag-on terminal applications Future requirements Multiple hosts & applications Different channels Cost Return on investment
  2. GHL’s Interception based approach Introduction to Key Features slides
  3. Does chip effectively prevent counterfeit fraud? The fraud statistics (Figure 1) for Malaysia clearly show the strong inverse relationship between increasing chip maturity and declining counterfeit fraud.
  4. Does chip effectively prevent counterfeit fraud? The fraud statistics (Figure 1) for Malaysia clearly show the strong inverse relationship between increasing chip maturity and declining counterfeit fraud.
  5. Does chip effectively prevent counterfeit fraud? The fraud statistics (Figure 1) for Malaysia clearly show the strong inverse relationship between increasing chip maturity and declining counterfeit fraud.
  6. Does chip effectively prevent counterfeit fraud? The fraud statistics (Figure 1) for Malaysia clearly show the strong inverse relationship between increasing chip maturity and declining counterfeit fraud.
  7. First & foremost, let us establish some of the facts before us…. Collection began in 2002 – contrast numbers: 20,733.5
  8. GHL’s Interception based approach Introduction to Key Features slides
  9. NetMATRIX TLE - Terminal NetMATRIX TLE comes with SDK for terminal Secure key storage for terminal Guards against terminal-to-terminal copy Local & Remote key injection capability NetMATRIX TLE – Host-side Plug N Play – Minimal change to infrastructure, no host changes 3-in-1 functionality – Digital SNAC, CNAC, TLE Form factors – Boxed solution Key Storage – HSM-based or Software-based (option) Selected-Field-Encryption (SFE), Full-Message-Encryption (FME) Multiple encryption algorithms: DES, 3DES, AES, TEA Multiple MACing algorithms: SHA-1+AES, SHA-1+RMAC Multiple key usage methodologies – unique-per-term, unique-per-txn Multiple hosts support Multiple key groups – different apps/vendors can have diff keys Multiple channels – dial-up, lease line, GPRS, GSM, broadband, etc Supports upstream & downstream encryption & MACing High-performance, high-availability, horizontal scalability (120 tps, 200 tps) ISO8583 compliant – will support any compliant NAC Utilities – Local & remote key injection utility Extensible – Can be used for other applications
  10. NAC sends transactions to NetMATRIX farm. NetMATRIX farm utilize a load-balancing service across the farm of machines, so that all these machines share the same virtual IP address. The NAC will try to establish a connection with this virtual IP address, and one of the NetMATRIX boxes will accept this connection request; thereafter, the NAC will have a persistent connection with this one box. Transactions from the NAC will subsequently be funneled through this connection and reach this primary NetMATRIX machine. The NetMATRIX box will then act to distribute these transaction messages to various other boxes in the farm for processing. Transaction load: > 120 tps = 7,200 tpm = 432,000 tphr = 10.3 million tpd = 311 million tpmonth
  11. NAC sends transactions to NetMATRIX farm. NetMATRIX farm utilize a load-balancing service across the farm of machines, so that all these machines share the same virtual IP address. The NAC will try to establish a connection with this virtual IP address, and one of the NetMATRIX boxes will accept this connection request; thereafter, the NAC will have a persistent connection with this one box. Transactions from the NAC will subsequently be funneled through this connection and reach this primary NetMATRIX machine. The NetMATRIX box will then act to distribute these transaction messages to various other boxes in the farm for processing.