Smart Card EMV for DummiesSlideShare
   UploadBrowse
    Popular Downloaded Favorited Channels Videos Featured Go Pro Login
   Signup
   EmailFavorite
  Favorited ×
  Save file Flag
  Private Content
  Embed
  Copy and paste this code into your blog or website Copy Customizeâ—¦ Without
  related content Start from slide number 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
  Size (px) 344 × 292 429 × 357 514 × 422 599 × 487 Shortcode for
WordPress.com
  blogs ? Copy Close
  Flagged as inappropriate Flag as inappropriate Flag as inappropriateSelect
  your reason for flagging this presentation as inappropriate. If needed, use
  the feedback form to let us know more details. None Pornographic Defamatory
    Illegal/Unlawful Spam Other Terms Of Service Violation Cancel File a
  copyright complaint
  We have emailed the verification/download link to "".
  Login to your email and click the link to download the file directly. To
  request the link at a different email address, update it here. Close
  Validation messages. Success message. Fail message. Check your bulk/spam
  folders if you can't find our mail.

  Favorited! You could also add tags    Cancel
  Edit your favorites
  Cancel

« ◹ ◺ »
/15 RelatedMoreUpload Chase 2010 - Wealth Intelligence for Dumâ—¦ For%20
  Dummies%20 Order%20 Form Athletic scholarships for dummies free pâ—¦ Asset
  allocation for dummies free pdf doâ—¦ Personal finance for dummies Gawp
  Presents redrum Adobe® premiere elements for dummies fr◦ Studios
Portfolio
  How to Market Plants Forensic accounting for dummies (for dumâ—¦ Financial
  accounting for dummies 1st by â—¦ Is There an Online Marketing for Dummiesâ—¦

  Economics Video: Performance Improvement for Dummiâ—¦ Dummies Books Quick
  books 2012 for dummies ShalinIndia News Letter Issue# 1 Currency Trading for

  Dummies Accounting for dummies 4th by john a. trâ—¦     How to Market a
Successful
  chip card proâ—¦
 Tweet
  34
  inShare
  Wordpress

+ Follow Smart Card EMV for Dummies
by phdexec on Aug 25, 2012 714
    views
Simplify EMV business for financial institutionsMoreâ—¦ Simplify EMV business
for
financial institutions
Less
AccessibilityView text versionCategoriesTechnologyFinanceUpload DetailsUploaded
via SlideShare as Adobe PDFUsage Rights© All Rights Reserved1 Embed
       100http://www.linkedin.com100

 StatisticsFavorites1Downloads0Comments0Embed Views100Views on
  SlideShare614Total Views714No comments yetNotes on Slide 7

 Subscribe to comments Post Comment    Edit your comment Cancel
1 Favorite   VinnyAnand
  1 week ago   Moreâ—¦Smart Card EMV for Dummies â—— Presentation Transcript
  1. PREPARE   YOURSELF FOR SUCCESS!©
  2. EMV â——   Europay, MasterCard andVisaâ—¢ A chip card is simply a plastic card

  containing an integrated circuit. â—¢ It contain an embedded micro- processor
  chip which will encrypt transaction data dynamically for each purchase
  3. EMV â—— Europay, MasterCard and Visaâ—¢ The chip technology on the card in
  conjunction with a PIN or signature verification, provides a two factor
  authentication necessary to combat fraud.â—¢ First U.S. payment card utilizing

  the EMV standard â——Chip & PINâ—— was issued by United Nation FCU in 2010
  4. So many definitions so little time!SMART CARD or is it a CHIP ENABLED CARD
  CHIP CARD or CHIP & PIN CHIP CONTACT CARD, CHIP & SIGNATURE At the end, they
  all do the same thing. So keep in mind it all means the same. A card with an
  integrated circuit. If we canâ——t even agree on a name, how are we going to
  agree on the rest?
  5. EMV is a global reality, with 1.3 billion cardsand 20.7 million card
  readers based on EMVstandard. Excluding U.S., 42.4% of cardsissued and over
  75.9% of POS card readersare EMV enabled. (EMVCO, Q3 2011)Its time you joined
  the club!
  6. EMV improves payment transaction security by: Card Authentication â——
  protecting against counterfeit cards Cardholder verification â—— protecting
  against lost or stolen cards Transaction authorization â—— using issuer
defined
  rules to authorize transactions
  7. Master your game by understanding the basics!PAYMENT METHOD VERIFICATION
  METHOD AUTHENTICATION METHOD
  8. PAYMENT METHOD Contact smart cards require you to CONTACT AND actually
  insert the card for identification purposes.CONTACLESS CARDS Contactless smart

  cards, also knows as RFID (radio frequency ID) only require you to be near the

  scanner for reading. Contactless smart cards make the identification process
  fast & easy. However, the same technology that enables you to use these cards
  without touching the scanner also makes it possible for enterprising hackers
  to steal information. Keep that in mind as you look at your options.
  9. VERIFICATION METHODChip & PIN or Chip & SignatureChip & PIN â—¢ Verify
  identity with PIN that must correspond to information on the chip â—¢ Most
  secure type of technology â—¢ Harder for fraudsters to replicate or steal your

   card. â—¢ Will have mag stripe on back of cardChip & Signature â—¢ Verify
identity
   with Signature â—¢ Less secure than Chip & PIN but more secure than mag stripe
â—¢
   Unable to use at unmanned kiosks â—¢ Shorter implementation time and cost â—¢
Will
   have mag stripe on back of card
   10. EMV card supports verification methods (CVMâ——s)Online PIN, is encrypted
by
   the PIN pad and sent to the card issuer online for verificationOffline PIN,
   where the PIN is verified offline by the chip on the card. Only the result is
   sentto the host.Signature authentication, where the cardholder signature is
verifiedNO CVM (typically for low value transactions or transactions at
  unattended POS locations) Network & terminal capabilities largely dictate
  which solution is to be used ATMâ——s are typically required to always support
  online PIN
  11. â—¢ EMV transactions can be authorized online or offline Cards can be
  configured to allow both online & offline authentication. Network & terminal
  capabilities largely dictate which solution is to be used.
  12. â—¢ Chip card uses key technology to generate a cryptogram, also called
  Authorization Request Cryptogram (ARQC)â—¢ ARQC is the dynamic data which
makes
  an EMV transaction unique & provides card present counterfeit fraud
  protectionâ—¢ Chip generates cryptogram by applying algorithm to the card, the

  device and the transaction dataâ—¢ Because cryptogram generation is different
  for each transaction, the resulting cryptogram is unique for each transaction
  13. Keep it in mind!â—¢ With online authorization, a dynamic cryptogram
protects
  against the use of skimmed data & stolen account dataâ—¢ Card usage
restrictions
  such as international use prohibitions are systematically enforcedâ—¢ With
  offline authorization, a PIN capability protects against lost & stolen card
  fraudâ—¢ With offline authorization, data authentication protects against
  counterfeit cardsâ—¢ Limits on offline activity protects against credit
overruns
  and fraud Source: emvco.com
  14. © PREPARE YOURSELF FOR SUCCESS!Aris Jerahianaris@arisjerahian.comA
payment
  industry executive with more than 20 years of client management, consulting
  and operationalexperience which helped establish long-term, successful
  partnership with financial institutions. He is theauthor of â——Courage to
  Change,â—— which aims to help readers improve both their professional and
  personallives, and serves as a council member on the Council of Advisors for
  Gerson Lehrman Group, a globalnetwork of executives who provide consultation
  to investment leaders.

  Connect on LinkedInFollow us on TwitterFind us on FacebookFind us on
  Google+Learn About Us
  About
  Careers
  Our Blog
  Press
  Contact us
  Help & SupportUsing SlideShare
  SlideShare 101
  Terms of Use
  Privacy Policy
  Copyright & DMCA
  Community Guidelines
  SlideShare on mobilePro & more
  Go PRO New
  Business Solutions
  Advertise on SlideShareDevelopers & API
  Developers Section
  Developers Group
  Engineering Blog
  Blog Widgets© 2012 SlideShare Inc. All rights reserved.RSS Feed
  ENGLISH (UNITED STATES)
    English (United States)FrançaisDeutsch ×

Smart card emv for dummies

  • 1.
    Smart Card EMVfor DummiesSlideShare UploadBrowse Popular Downloaded Favorited Channels Videos Featured Go Pro Login Signup EmailFavorite Favorited × Save file Flag Private Content Embed Copy and paste this code into your blog or website Copy Customize◦ Without related content Start from slide number 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Size (px) 344 × 292 429 × 357 514 × 422 599 × 487 Shortcode for WordPress.com blogs ? Copy Close Flagged as inappropriate Flag as inappropriate Flag as inappropriateSelect your reason for flagging this presentation as inappropriate. If needed, use the feedback form to let us know more details. None Pornographic Defamatory Illegal/Unlawful Spam Other Terms Of Service Violation Cancel File a copyright complaint We have emailed the verification/download link to "". Login to your email and click the link to download the file directly. To request the link at a different email address, update it here. Close Validation messages. Success message. Fail message. Check your bulk/spam folders if you can't find our mail. Favorited! You could also add tags Cancel Edit your favorites Cancel « ◹ ◺ » /15 RelatedMoreUpload Chase 2010 - Wealth Intelligence for Dum◦ For%20 Dummies%20 Order%20 Form Athletic scholarships for dummies free p◦ Asset allocation for dummies free pdf do◦ Personal finance for dummies Gawp Presents redrum Adobe® premiere elements for dummies fr◦ Studios Portfolio How to Market Plants Forensic accounting for dummies (for dum◦ Financial accounting for dummies 1st by ◦ Is There an Online Marketing for Dummies◦ Economics Video: Performance Improvement for Dummi◦ Dummies Books Quick books 2012 for dummies ShalinIndia News Letter Issue# 1 Currency Trading for Dummies Accounting for dummies 4th by john a. tr◦ How to Market a Successful chip card pro◦ Tweet 34 inShare Wordpress + Follow Smart Card EMV for Dummies by phdexec on Aug 25, 2012 714 views Simplify EMV business for financial institutionsMore◦ Simplify EMV business for financial institutions Less AccessibilityView text versionCategoriesTechnologyFinanceUpload DetailsUploaded via SlideShare as Adobe PDFUsage Rights© All Rights Reserved1 Embed 100http://www.linkedin.com100 StatisticsFavorites1Downloads0Comments0Embed Views100Views on SlideShare614Total Views714No comments yetNotes on Slide 7 Subscribe to comments Post Comment Edit your comment Cancel
  • 2.
    1 Favorite VinnyAnand 1 week ago More◦Smart Card EMV for Dummies ◗ Presentation Transcript 1. PREPARE YOURSELF FOR SUCCESS!© 2. EMV ◗ Europay, MasterCard andVisa◢ A chip card is simply a plastic card containing an integrated circuit. ◢ It contain an embedded micro- processor chip which will encrypt transaction data dynamically for each purchase 3. EMV ◗ Europay, MasterCard and Visa◢ The chip technology on the card in conjunction with a PIN or signature verification, provides a two factor authentication necessary to combat fraud.◢ First U.S. payment card utilizing the EMV standard ◗Chip & PIN◗ was issued by United Nation FCU in 2010 4. So many definitions so little time!SMART CARD or is it a CHIP ENABLED CARD CHIP CARD or CHIP & PIN CHIP CONTACT CARD, CHIP & SIGNATURE At the end, they all do the same thing. So keep in mind it all means the same. A card with an integrated circuit. If we can◗t even agree on a name, how are we going to agree on the rest? 5. EMV is a global reality, with 1.3 billion cardsand 20.7 million card readers based on EMVstandard. Excluding U.S., 42.4% of cardsissued and over 75.9% of POS card readersare EMV enabled. (EMVCO, Q3 2011)Its time you joined the club! 6. EMV improves payment transaction security by: Card Authentication ◗ protecting against counterfeit cards Cardholder verification ◗ protecting against lost or stolen cards Transaction authorization ◗ using issuer defined rules to authorize transactions 7. Master your game by understanding the basics!PAYMENT METHOD VERIFICATION METHOD AUTHENTICATION METHOD 8. PAYMENT METHOD Contact smart cards require you to CONTACT AND actually insert the card for identification purposes.CONTACLESS CARDS Contactless smart cards, also knows as RFID (radio frequency ID) only require you to be near the scanner for reading. Contactless smart cards make the identification process fast & easy. However, the same technology that enables you to use these cards without touching the scanner also makes it possible for enterprising hackers to steal information. Keep that in mind as you look at your options. 9. VERIFICATION METHODChip & PIN or Chip & SignatureChip & PIN ◢ Verify identity with PIN that must correspond to information on the chip ◢ Most secure type of technology ◢ Harder for fraudsters to replicate or steal your card. ◢ Will have mag stripe on back of cardChip & Signature ◢ Verify identity with Signature ◢ Less secure than Chip & PIN but more secure than mag stripe ◢ Unable to use at unmanned kiosks ◢ Shorter implementation time and cost ◢ Will have mag stripe on back of card 10. EMV card supports verification methods (CVM◗s)Online PIN, is encrypted by the PIN pad and sent to the card issuer online for verificationOffline PIN, where the PIN is verified offline by the chip on the card. Only the result is sentto the host.Signature authentication, where the cardholder signature is
  • 3.
    verifiedNO CVM (typicallyfor low value transactions or transactions at unattended POS locations) Network & terminal capabilities largely dictate which solution is to be used ATM◗s are typically required to always support online PIN 11. ◢ EMV transactions can be authorized online or offline Cards can be configured to allow both online & offline authentication. Network & terminal capabilities largely dictate which solution is to be used. 12. ◢ Chip card uses key technology to generate a cryptogram, also called Authorization Request Cryptogram (ARQC)◢ ARQC is the dynamic data which makes an EMV transaction unique & provides card present counterfeit fraud protection◢ Chip generates cryptogram by applying algorithm to the card, the device and the transaction data◢ Because cryptogram generation is different for each transaction, the resulting cryptogram is unique for each transaction 13. Keep it in mind!◢ With online authorization, a dynamic cryptogram protects against the use of skimmed data & stolen account data◢ Card usage restrictions such as international use prohibitions are systematically enforced◢ With offline authorization, a PIN capability protects against lost & stolen card fraud◢ With offline authorization, data authentication protects against counterfeit cards◢ Limits on offline activity protects against credit overruns and fraud Source: emvco.com 14. © PREPARE YOURSELF FOR SUCCESS!Aris Jerahianaris@arisjerahian.comA payment industry executive with more than 20 years of client management, consulting and operationalexperience which helped establish long-term, successful partnership with financial institutions. He is theauthor of ◗Courage to Change,◗ which aims to help readers improve both their professional and personallives, and serves as a council member on the Council of Advisors for Gerson Lehrman Group, a globalnetwork of executives who provide consultation to investment leaders. Connect on LinkedInFollow us on TwitterFind us on FacebookFind us on Google+Learn About Us About Careers Our Blog Press Contact us Help & SupportUsing SlideShare SlideShare 101 Terms of Use Privacy Policy Copyright & DMCA Community Guidelines SlideShare on mobilePro & more Go PRO New Business Solutions Advertise on SlideShareDevelopers & API Developers Section Developers Group Engineering Blog Blog Widgets© 2012 SlideShare Inc. All rights reserved.RSS Feed ENGLISH (UNITED STATES) English (United States)FrançaisDeutsch ×