SlideShare a Scribd company logo
1 of 37
Download to read offline
EMV
Mobile Contactless Payment


Technical Issues and Position Paper




Version 1.0
October 2007
EMV Mobile Contactless Payment
                                Technical Issues and Position Paper Version 1.0




Page ii   © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.      October 2007
EMV
Mobile Contactless Payment


Technical Issues and Position Paper




Version 1.0
October 2007




© 1994-2007 EMVCo, LLC (“EMVCo”). All rights reserved. Any and all uses of the
EMV Specifications (“Materials”) shall be permitted only pursuant to the terms and conditions of the
license agreement between the user and EMVCo found at http://www.emvco.com/specifications.cfm.
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0




Page ii            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.   October 2007
EMV Mobile Contactless Payment
                                                            Technical Issues and Position Paper Version 1.0



                                                   Contents
1     Introduction......................................................................................................... 1
    1.1     Document Purpose and Scope...................................................................... 1
    1.2     References..................................................................................................... 2
    1.3     Definitions .................................................................................................... 2
    1.4     Mobile Device Architecture.......................................................................... 4
      1.4.1       Logical Architecture .............................................................................. 4
    1.5     Proximity Payment Architecture................................................................. 6
    1.6     Implementation Options for the Secure Element....................................... 7
      1.6.1       Embedded Hardware Secure Element ................................................. 8
      1.6.2       Secure Element on UICC ...................................................................... 8
      1.6.3       Removable Hardware Secure Element................................................. 8
      1.6.4       Secure Element in Mobile Device Baseband Processor....................... 8
2     Provisioning and Personalization ...................................................................... 9
    2.1     Introduction .................................................................................................. 9
    2.2     Possible Options for Device Provisioning and Personalisation.................. 9
    2.3     Provisioning and Personalisation of the Secure Element ........................ 10
      2.3.1       Embedded Hardware SE..................................................................... 10
      2.3.2       SE on UICC.......................................................................................... 10
      2.3.3       Removable Hardware Security Element ............................................ 11
      2.3.4       SE in baseband processor.................................................................... 11
      2.3.5       Summary.............................................................................................. 11
      2.3.6       Separation of Provisioning and Personalisation................................ 12
      2.3.7       Pre-distribution personalization......................................................... 12
    2.4     Post-distribution Payment Application Provisioning Process Issues...... 12
      2.4.1       Payment Application / Credentials Installation Process................... 12
      2.4.2       Update of Payment Application and Credentials .............................. 14
      2.4.3       Payment Application and Credentials Deletion ................................ 15
      2.4.4       Device Change with Embedded Secure Element............................... 16
      2.4.5       Device Change with Removable Secure Element .............................. 16
      2.4.6       User Interface Application Provisioning ............................................ 17
3     Customer Care .................................................................................................. 19
4     Usability ............................................................................................................ 21
    4.1     Introduction ................................................................................................ 21
    4.2     Transaction Experience Usability Issues.................................................. 21
      4.2.1       User Authentication / Cardholder Verification.................................. 21
      4.2.2       Multiple payment applications on single device................................ 22
      4.2.3       Payment Credential Selection Process............................................... 23
      4.2.4       Payment Credential Availability with Device Off ............................. 24



October 2007               © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.                                        Page iii
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


  4.3     Branding ..................................................................................................... 26
    4.3.1       Branding via the User Interface ......................................................... 26




Page iv                 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.                               October 2007
EMV Mobile Contactless Payment
                                       Technical Issues and Position Paper Version 1.0


                                   Tables

Table 1 Summary of Provisioning and Personalization Options for Secure
         Elements                                                                  11




October 2007     © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.             Page v
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0




Page vi            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.   October 2007
EMV Mobile Contactless Payment
                                       Technical Issues and Position Paper Version 1.0


                                  Figures

Figure 1: Logical Architecture of a Mobile Device                                   4
Figure 2: Example implementation of logical interfaces                              5
Figure 3: Another example implementation of logical interfaces                      6
Figure 4: Mobile Contactless Payment Architecture                                   7




October 2007     © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.            Page vii
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0




Page viii          © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.   October 2007
EMV Mobile Contactless Payment
                                        Technical Issues and Position Paper Version 1.0




1       Introduction

1.1     Document Purpose and Scope
The increased deployment of contactless payment infrastructure, combined with
the increased interest in adding contactless capability to mobile devices leads to
the natural combination of contactless payment in mobile devices. This document
sets out the EMVCo position on technical issues related to implementing
contactless payment in a mobile device.
The document identifies technical issues and the response EMVCo will make to
address these issues. Specifically, the document will address identified mobile
contactless payment ecosystems issues in the following categories:
    •   Provisioning and Personalization of the secure element on a mobile
        platform with the contactless payment application.
           o   The entire processes of pre-distribution, post-distribution
               application installation, update, and deletion will be reviewed;
               and,
           o   Additionally, topics of device changes with embedded or removable
               secure elements, as well as considerations associated with the
               provisioning of the User Interface Application will also be
               reviewed.
    •   Possible technical assistance to help address Customer care will be
        reviewed.
    •   Usability of mobile device for contactless payment including:
           o   User Authentication and Cardholder Verification;
           o   Multiple payment applications on a single mobile device;
           o   Payment Credential selection process;
           o   Payment Credential availability with device off; and,
           o   Branding via the User Interface.


The document confines itself to technical discussion, and does not address issues
such as business relationships which may need to be formed to support the
deployment of contactless payment in mobile devices.
This document draws from many of the issues identified in the Mobile Payment
Forum document, “Mobile Proximity Payment Issues and Recommendations”
[MPIR], considering them in an EMVCo context. Additional issues and concerns
are also documented.




October 2007      © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.             Page 1
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


1.2      References
         [14443]     ISO/IEC 14443: Identification cards -- Contactless integrated
                     circuit(s) cards -- Proximity cards, www.iso.org
         [MPAF]      Mobile Payments Architectural framework and Use Cases,
                     Version 1.0, Mobile Payment Forum,
                     www.mobilepaymentforum.org
         [NFC]       ISO/IEC 18092: Information technology --
                     Telecommunications and information exchange between
                     systems -- Near Field Communication -- Interface and Protocol
                     (NFCIP-1), www.iso.org
         [PPTA]      Proximity Payment Technology Assessment, Version 1.0,
                     Mobile Payment Forum, www.mobilepaymentforum.org
          [RADP]     Requirements for Application Download and Personalization,
                     Mobile Payment Configuration and Maintenance, Version 1.0,
                     Mobile Payment Forum, www.mobilepaymentforum.org
         [SATS]      Security and Trust Services API (SATSA) for Java™ 2
                     Platform, Micro Edition, Version 1.0, JSR 177 Expert Group,
                     Java Community Process (JCP), www.jcp.org
         [STIP]      STIP Core Framework Technology, A Technical Specification,
                     Version 2.2, GlobalPlatform, www.globalplatform.org
         [GPCS]      GlobalPlatform Card Specification, versions 2.1.1 & 2.2,
                     GlobalPlatform, www.globalplatform.org
         [MPIR]      Mobile Proximity Payment Issues and Recommendations,
                     Version 1.0, Mobile Payment Forum,
                     www.mobilepaymentforum.org


1.3       Definitions
           API                       Application Program Interface
           ATM                       Automated Teller Machine
           BIP                       Bearer Independent Protocol
           CDMA                      Code Division Multiple Access
           CLWG                      EMVCo Contactless Working Group
           Contactless RF            Generic term for multiple varieties of short-
                                     range RF communication technology
           CPS                       EMV Card Personalisation Specification
           GP                        GlobalPlatform
           GPRS                      General Packet Radio System
           GSM                       Global System for Mobile communications



Page 2             © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.      October 2007
EMV Mobile Contactless Payment
                                        Technical Issues and Position Paper Version 1.0


          JCP                     Java Community Process
          JSR                     Java Specification Request
          LAN                     Local Area Network
          MMI                     Man-Machine Interface
          MMS                     Multimedia Messaging
          MNO                     Mobile Network Operator
          NFC                     Near-Field Communication
          OMA                     Open Mobile Alliance
          OTA                     Over-the-Air
          PAN                     Personal Area Network
          PDA                     Personal Digital Assistant
          PIN                     Personal Identification Number
          POS                     Point of Sale
          PPSE                    A list of all Combinations supported by the
                                  Contactless Card. PPSE (Proximity Payment
                                  System Environment) is used in Entry Point
                                  Selection Process.
          Proximity Payment       A payment where the consumer is physically
                                  present at the point of sale.
          RF                      Radio Frequency
          RFID                    Radio Frequency IDentification
          RUIM                    Removable Universal Identity Module
          SATSA                   Security And Trust Services API
          SE                      Secure Element
          SIM                     Subscriber Identity Module
          SSO                     Single Sign On
          STIP                    Small Terminal Interoperability Platform
          STK                     SIM Tool Kit
          SMC                     Secure Multimedia Card
          UI                      User Interface
          UICC                    Universal Integrated Circuit Card
          UMTS                    Universal Mobile Telephone System
          URL                     Uniform Resource Locator
          USIM                    Universal Subscriber Identity Module




October 2007      © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.             Page 3
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


                                  WLAN                       Wireless Local Area Network


1.4                    Mobile Device Architecture

1.4.1                                   Logical Architecture
The logical architecture assumed for the mobile device is shown in Figure 1.
                       Secure Element
      Secure Element




                                           Figure 1: Logical Architecture of a Mobile Device

The mobile device consists of the following logical components, a mobile
platform, and one or more secure elements.
The secure element is where one or more payment applications are hosted, and
provides a secure area for the execution of the applications and protection of the
payment assets (e.g. payment data, keys, the payment application code). The
secure element may also host applications which are not related to payment.




Page 4                                       © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.   October 2007
EMV Mobile Contactless Payment
                                         Technical Issues and Position Paper Version 1.0


The mobile platform is the device in which the secure element is hosted, and
also contains other components such as a user interface (UI) for both input and
output, an application environment (such as a Java or other virtual machine, or
the native operating system of the mobile device), a proximity modem (based on
EMV contactless level 1 or other compatible standard), and a wide-area modem.
In the context of this document, the wide-area modem is likely to be a cellular
modem, however it could also be a wired modem, or wireless LAN.
The secure element and the mobile platform provide logical interfaces between
the payment application and the user interface, between the payment application
and the application environment, between the payment application and
proximity modem, and between the payment application and the wide area
modem.
In practice, the logical interfaces may be implemented via other elements within
the mobile platform. For example, the payment application to UI interface may
be implemented via a user interface application present in the application
environment on the mobile platform. This situation is illustrated in Figure 2:
where the interfaces between the payment application and the user interface and
payment application and wide area modem are established via applications
running in the application environment.




               Figure 2: Example implementation of logical interfaces

In the example given in Figure 2: the user interface application needs to be
installed on the mobile platform.
Another example given in Figure 3 is the secure element includes the contactless
modem, e.g. a NFC chip incorporating a secure element or a secure element
directly handling the contactless protocol and directly connected to the
contactless antenna.



October 2007       © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.             Page 5
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0



 Mobile Platform


                                            Application Environment
                                                                                Wide area
             User Interface                                                      modem




                                                             Secure Element



                                                                   Payment       Contactless
                                                                  application
                                                                      Payment modem
                                                                     application




         Figure 3: Another example implementation of logical interfaces


1.5      Proximity Payment Architecture
A block diagram showing the architecture of a mobile contactless payment
system is given in Figure 4: .




Page 6              © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.       October 2007
EMV Mobile Contactless Payment
                                           Technical Issues and Position Paper Version 1.0




                                             Contactless Interface        Merchant Point of
                Mobile device
                                                                            Sale Device




                 Provisioning /
 Side channel
                Personalisation




                   Issuer                                                      Acquirer



                                            Authorization and
                                            clearing network



                 Figure 4: Mobile Contactless Payment Architecture

The mobile device holds a contactless payment application.
The payment account issuer will provision and personalise the contactless
payment application on the mobile device. There may also be a side channel link
between the issuer and the mobile device for updating of payment application
information (such as EMV scripts).
The mobile device communicates with a merchant point of sale device over the
contactless interface to allow the contactless payment application to perform a
transaction.
The merchant is connected to an acquirer, and through an authorization and
clearing network to the issuer. EMVCo standards will ensure that the merchant
POS infrastructure for accepting mobile contactless payment converges with the
EMV Common Contactless Communications Protocol and so are not considered
further in this document.


1.6      Implementation Options for the Secure Element
Four implementation options for the secure element have been identified at this
point. It is possible that additional implementation options will be available to
device implementers in the future; if so, these additional implementations will
need to provide appropriate security services for supporting proximity payment.




October 2007         © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.             Page 7
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


1.6.1       Embedded Hardware Secure Element
The secure element may be a hardware tamper resistant module which is
embedded in the mobile device. For example this may be a component such as a
smartcard chip which is soldered on the circuit board of the mobile platform or a
secure core on an NFC chip.


1.6.2       Secure Element on UICC
The secure element may be in the UICC, the smartcard which hosts the
application used for identification for mobile telephony purposes (such as the
USIM or RUIM).


1.6.3       Removable Hardware Secure Element
The secure element may be a removable hardware element, such as smartcard, or
a secure core on a multimedia card. In many ways this is similar to the
removable UICC option described above, however it is not associated with the
particular mobile subscription, nor does it need to support telephony services for
the mobile device.


1.6.4       Secure Element in Mobile Device Baseband
            Processor
The secure element may be hosted as part of the baseband processor (that is, the
multipurpose processor which powers the mobile device) using portions of secure
memory and processing. This is potentially a longer term solution.
It is expected that the options described in sections 1.6.1 Embedded Hardware
Secure Element and 1.6.2 Secure Element on UICC will be the dominant options
in the short term, with the option described in section 1.6.4 Secure Element in
Mobile Device Baseband Processor being a longer term opportunity.




Page 8             © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.   October 2007
EMV Mobile Contactless Payment
                                        Technical Issues and Position Paper Version 1.0




2      Provisioning and Personalization

2.1     Introduction
Traditionally cards and other tokens carrying an EMV payment application are
single purpose tokens1, provided to the user by an issuer with the express intent
that the token is used for payment. Such tokens are typically provisioned and
personalised before the personalised token is delivered to the cardholder. As the
token is provided by the issuer, the issuer knows the characteristics of the token
(such as token type, operating system, and provisioning method) as the issuer
has specified these to the supplier.
A mobile device on the other hand is a general purpose device, one of its uses
possibly being mobile proximity payment. Typically the mobile device is not
provided by an issuer, and the lifecycle of the mobile device is separate from that
of any payment application or payment data. As the issuer may not have been
involved in the procurement of the mobile device, the issuer may have little
influence on the characteristics of the mobile device, such as operating system,
and will likely have to support provisioning and personalisation of a range of
devices which may have differing characteristics.
A new factor in the provisioning and personalisation of mobile devices is that the
mobile device may have a user interface application, which also needs to be
provisioned, and which needs to interact with the payment application. This user
interface application will need to adapt to different mobile device characteristics
such as application environment and screen capabilities.
Device provisioning involves the delivery of the contactless payment application
and personalization credentials necessary for a mobile device to be used as an
instrument for making contactless payments, as well as any User Interface
application. To provision a mobile device with the necessary information, a
variety of security- and privacy-related issues must be addressed, in addition to
other issues related to the process of managing the lifecycle of the payment
credentials.


2.2     Possible Options for Device Provisioning and
        Personalisation
There are a number of approaches to provisioning and personalisation of the
secure element.
There are four main processes:



1The token may be a multi-application token, however the other applications are
generally known beforehand.



October 2007      © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.             Page 9
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


   •    The first is to provision the payment application code on the secure
        element.
   •    The second is to personalise the payment application with account details.
   •    The third is provisioning the user interface application on the mobile
        device.
   •    The fourth is personalising the user interface application with any
        account specific details.
These processes may occur separately or together. They may also occur before or
after the distribution of the mobile device and secure element.
In considering provisioning and personalisation of a mobile device, it needs to be
remembered that before the issuing of the mobile device it may be unknown
whether the device will be used for payment, and which issuer(s) may need to
personalise the device.


2.3       Provisioning and Personalisation of the Secure
          Element
The sections below consider the different options of the secure element, and
whether they are suited to provisioning and personalisation before or after
distribution.


2.3.1       Embedded Hardware SE
Provisioning of the payment application may occur before distribution (provided
the payment application is suitable for candidate issuers, and is sufficiently
likely to be used to justify the costs of doing so), or may occur after the mobile
device is provided to the end user.
Unless issuers are prepared to provide cardholders with mobile devices, the
personalisation of the mobile device will need to be performed after the device is
provided to the end user.


2.3.2       SE on UICC
The UICC is a removable element, which provides for provisioning and
personalisation to be done either before the distribution of the USIM to the
cardholder, or after the distribution.
A UICC is provided by the cardholder’s mobile network operator, thus if it is to
be provisioned and/or personalised for payment before the UICC is distributed to
the user by the MNO, then agreements must be in place between the MNO and
payment issuers before the UICC is sent out.




Page 10            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.   October 2007
EMV Mobile Contactless Payment
                                        Technical Issues and Position Paper Version 1.0


2.3.3       Removable Hardware Security Element
A removable hardware security element is not controlled by the MNO in the
same way that a UICC is. It may be controlled by a payment issuer in much the
same way as any other contactless payment form-factor.
This makes the removable hardware secure element a candidate for provisioning
and personalisation before distribution, although it may also be provisioned or
personalised after distribution.


2.3.4       SE in baseband processor
Implementing a secure element inside a baseband processor is in many ways
similar to having an embedded hardware secure element in terms of provisioning
and personalisation.
Provisioning may be performed before distribution, or after distribution.
Personalisation will need to be performed post-distribution.


2.3.5       Summary
   Table 1 Summary of Provisioning and Personalization Options for Secure
                                 Elements

                  Provisioning of Payment        Personalisation of
                  Application                    Account Information

                  Pre-            Post-          Pre-           Post-
                  distribution    distribution   distribution   distribution

Embedded
Hardware SE

SE on UICC

SE on
removable
hardware

SE in baseband
processor




October 2007      © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.            Page 11
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


2.3.6       Separation of Provisioning and Personalisation
Provisioning and personalisation may occur simultaneously or separately. For
example, an issuer may load both the payment application and personalisation
information into a secure element. On the other hand, a secure element may
have the payment application installed before distribution (for example, burnt
into ROM), and then be instantiated and personalised after distribution. It
should be possible to have a single application in ROM which could be used by a
range of issuers.

EMVCo Planned Action:
EMVCo to consider a functional requirement that provisioning and
personalisation of the contactless payment application can be in a single or
separate sessions. Additionally, the EMVCo CLWG is to ensure there is a
standard mechanism to personalise a contactless payment application based on
EMV CPS.


2.3.7       Pre-distribution personalization
The processes for personalisation which occurs pre-distribution are very similar
to those currently used for cards and other similar form-factors such as key fobs,
and so is not considered in further detail in this document.


2.4       Post-distribution Payment Application
          Provisioning Process Issues
This section details the issues related to the process of managing the lifecycle of
the payment credentials, apart from those directly related to security.


2.4.1       Payment Application / Credentials Installation
            Process
Description
Provisioning and personalisation of the payment application post-distribution
require a connection from the issuer personalisation bureau to the mobile device.
This may be provided over a number of different media. Examples include:
   •    Using the wide area cellular network, with an appropriate mobile client
        application to route the provisioning and personalisation data to the
        secure element.
   •    Using the contactless interface at a provisioning point. The provisioning
        point provides the connectivity to the personalisation bureau. Such
        provisioning points could be placed in a bank branch, at an ATM or other
        such locations.




Page 12            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.    October 2007
EMV Mobile Contactless Payment
                                        Technical Issues and Position Paper Version 1.0


   •   Using a connected device such as a PC to establish a connection with a
       personalisation bureau and to transfer the data via a conduit to the
       mobile device (similar to synchronising phone book or email data with a
       PC).
Regardless of the medium used to transfer the provisioning and personalisation
data, there are a number of common elements that need to be considered.
The personalisation bureau needs a protocol to provision the payment application
on the secure element. This protocol is likely to be tied to the operating system of
the secure element. As post-distribution personalisation will not occur in the
same physically secure environment as that provided by a traditional
personalisation bureau, this protocol must provide sufficient security for carrying
the data over open networks.
A number of such protocols exist, and may be reused. GlobalPlatform provides
such protocols and GSM 03.48 provides secure messaging for USIM based secure
elements. These may be used in conjunction with EMV CPS in order to provide a
secure delivery mechanism.

EMVCo Planned Action
EMVCo will consider how EMV CPS may be used with secure messaging
protocols such as those of GP and GSM 03.48 in a mobile environment. If
necessary, EMVCo will consider enhancing CPS to provide the necessary
capabilities for the mobile environment, and providing best practice guidelines as
appropriate.
Once a payment application is loaded on the secure element there may be a need
to register the application in some way in order to make it available for selection,
for example, it may need to be registered with the PPSE.

EMVCo Planned Action
EMVCo to consider developing requirements of standard methods for registering
a new application on a Secure Element, and collaborating with other bodies such
as GlobalPlatform to define the appropriate method and mechanism for
registration.
Determining the level of user interaction that should be required/allowed during
the provisioning process, particularly during account or application updates -
asking for user acknowledgement or approval during an update might cause a
delay in the process, while not doing so could result in the user contacting
customer service to inquire about the nature of the change.
Assuring the user that a valid payment application and payment credentials
have been installed on the device – since an OTA transfer of payment
information is largely invisible to the user, some mechanism will be needed to
inform the user that the payment credentials are ready to use, and that the
credentials are authentic and valid.




October 2007      © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.           Page 13
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


EMVCo Planned Action
EMVCo to consider developing User Interface requirements to assist the user in
securely managing and monitoring the processes for provisioning, personalisation
and update of the payment application on a Secure Element in a mobile device.
A number of the standard operating systems which may be used for secure
elements have a number of implementation options. Payment associations or
other service providers (including those outside of the payment area) may require
specific configurations of the operating system. In the traditional card world this
can be catered for by using a particular configuration based on the application to
be placed on the card. In the case of mobile payment, the secure element will be
shared by many applications, and cannot be customised to a particular
application.

EMVCo Planned Action
EMVCo to consider identifying the requirements of a standard configuration of
operating systems to support contactless payment applications, and to work with
other industries to develop a de-facto standard.


2.4.2       Update of Payment Application and Credentials
As with traditional credit cards, the payment instruments installed in mobile
devices for proximity payment will need to be updated as their expiration date
nears. Parameters within the payment application may also need to be reset.
The process should be able to be made transparent to the user, although user
notification may be desirable for certain updates.
EMV Scripts and post-distribution personalisation mechanisms such as EMV
CPS should be used for updating data objects. In order to apply these
mechanisms, there must be a mechanism for the payment application to interact
with the issuer host system.
Periodically there may be a need to update the payment application to a new
version, whether due to a change in the specifications, to offer enhanced
functionality, to fix bugs or provide additional security. In this case removal and
reprovisioning and personalisation of the payment application is necessary.

EMVCo Planned Actions
EMVCo to consider the use of EMV Scripts and EMV CPS in the mobile
environment, in particular for post issuance and post distribution updating of the
payment application and its counters and parameters; additionally, EMVCo to
develop best practice guidelines and User Interface requirements for the
management of post-distribution provisioning mechanisms, such as those offered
by GlobalPlatform. Enhancements to the PPSE will also be considered as
appropriate (also see section 4.2.2).




Page 14            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.    October 2007
EMV Mobile Contactless Payment
                                        Technical Issues and Position Paper Version 1.0



2.4.3      Payment Application and Credentials Deletion
Description
There needs to be a mechanism for deleting the payment credentials, and
possibly even the payment application, from the mobile device after distribution.
Such a deletion might be initiated by the user (“cutting up a credit card”), or it
may be a revocation initiated by the account issuer. Another (tricky) scenario is a
deletion at the request of the MNO e.g. due to discontinuation of the mobile
service to the end-user or due to business disagreements between the MNO and
account issuer.
Deletion of the payment information is an important aspect in the lifecycle of a
payment instrument. There needs to be mechanism for the account issuer to
remotely revoke the payment credentials, and even delete the complete payment
application, if needed. This “push deletion” could be invoked for a variety of
reasons, including the mobile device being reported lost or stolen, or due to the
payment history of the account holder.
Whatever the reason, a mechanism for push deletion needs to be defined, to allow
the payment instrument to be deleted by the account issuer as needed. However,
the requirements for user interaction during a push deletion need to be
considered. If the deletion is because the phone was lost or stolen, then requiring
user interaction defeats this as a security measure. On the other hand, deletion
without informing the user may also cause confusion, and so user notification
after the event may be the best option.
There may also be a desire to provide the user with a mechanism for removing
their payment credentials from the mobile device if so desired. Such a
mechanism would need to provide the user with the means to select the specific
payment credentials that they want to delete, and to even delete the payment
application in its entirety, if the user no longer wants to have access to the
proximity payment functionality.
On the other hand, providing the user with a mechanism to delete their payment
credentials or application could result in accidental deletion, which could
certainly lead to customer service issues. In order to get payment credentials
restored which have been accidentally deleted, it may be unclear to the user
whether they need to call their account issuer, or their mobile network operator.
The level of visibility that a mobile operator has into what applications the user
has on their device can vary on the model that is in use for allowing downloads.
For example, some operators allow the user to download any application, while
others allow it only through their portal. So support from the mobile network
operator for reinstalling a deleted payment application may be limited.
An alternative to allowing the user to delete their payment credentials is to
provide the user with the necessary contact information to request the deletion of
the credentials, and then to have the deletion initiated by the account issuer, or
other responsible party.




October 2007      © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.           Page 15
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


EMVCo Planned Actions
EMVCo to consider best practices guidelines that the methods used to provision
the payment application in a secure element also be able to remove the payment
application. In the event that the secure element application environment does
not allow for the deletion of the payment application, EMVCo to consider User
Interface requirements and mechanisms to allow for the disablement of the
payment application and the deletion of the payment credentials.
EMVCo to consider developing requirements and collaborating with standards
bodies such as GlobalPlatform to provide application deletion/disablement
capabilities to the user, account issuer or possibly the MNO.


2.4.4       Device Change with Embedded Secure Element
A device change could occur for a variety of reasons, including the user upgrading
to a new mobile device, or replacing a device which has been lost or stolen. In
some cases, this change could also include a change of mobile subscription, as
detailed above.
If the secure element is embedded in the mobile device, then such a change may
require the entire personalisation process to be repeated for the new mobile
device, including both the payment application, and the payment credentials
issued to the device user. This would follow the personalisation process described
above.
Under ideal circumstances, any information related to the payment credentials
will be deleted from a mobile device before any attempt is made to reinstall them
on a replacement mobile device. This should be done according to the processes
for deletion above.

EMVCo Planned Actions
EMVCo to consider a best practices guideline that the standard processes for
deletion and provisioning and personalisation should be used to transfer the
credentials from one mobile device secure element to another mobile device
secure element.


2.4.5       Device Change with Removable Secure Element
Description
Mobile devices utilizing a removable secure element are also subject to routine
replacement/upgrading, but because the secure element is removable, in some
instances it can be transferred by the user to the new mobile device, assisting in
the transition.
Of course, if a device is lost, the situation would be similar to a device change
with a non-removable secure element, e.g. loss of both the mobile device and the
secure element. This section discusses the situation where the mobile device
itself is being changed, and the secure element is being transferred to the new
device.




Page 16            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.   October 2007
EMV Mobile Contactless Payment
                                         Technical Issues and Position Paper Version 1.0


The advantage of having a removable secure element is that a complete re-
personalization of the mobile device may not be required when a device change is
made. However, any time the secure element is transferred from one device to
another, the compatibility of the new device will need to be verified.
Compatibility includes not only physical and electrical compatibility of the
removable element with the new phone, but also compatibility of the user
interface application with the payment application. If the user interface
application has been personalised or customized by the user2, then this
personalisation or customisation may also need to be transferred. Device
management, such as that defined by the Open Mobile Alliance, provides tools to
enable a new device to replicate the set up of a previous device by means of data
(for example, branding elements, user preferences etc.) stored on a device
management server.

EMVCo Planned Actions
In order to enable interoperability between removable secure elements, EMVCo
to consider the development of requirements of standardised commands from the
user interface application and the payment application along with standard
application labels which may be used to store customised information associated
with the payment application. These requirements will also consider the security
between the user interface application and payment application.
EMVCo to consider development of requirements for management of customised
elements on a mobile device and collaborate with standards bodies such as the
Open Mobile Alliance to define appropriate device management mechanisms.


2.4.6      User Interface Application Provisioning
The user interface application will need to be provisioned and possibly
personalised on the mobile platform or the secure element3.
As with the payment application, the user interface application may be
provisioned either pre-distribution of the mobile device, or post-distribution.
Standardisation of the API between the user interface application and the
payment application would allow for greater flexibility in pre-distribution
provisioning.
Most mobile application environments provide standard methods of provisioning
applications on the mobile platform.

EMVCo Planned Actions
EMVCo to consider defining the API between the user interface application and
the payment application (see also section 2.4.5).



2This may include user defined names for accounts, priorities or preferences of
accounts and so on.
3For example, if the user interface application makes use of USIM Application
Toolkit, it would reside on the UICC.



October 2007      © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.            Page 17
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


Additionally, EMVCo to consider a best practices guideline that the standard
methods of provisioning applications on the mobile platform should be used
and/or enhanced for provisioning the user interface application.




Page 18            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.   October 2007
EMV Mobile Contactless Payment
                                        Technical Issues and Position Paper Version 1.0




3      Customer Care
Customer care for mobile devices is most commonly handled by the MNO, who
has the primary relationship with the mobile device user. Mobile manufacturers
may also provide customer care for hardware issues.
If payment is introduced on a mobile device, users may still associate customer
care with the MNO, or may address concerns to the account issuer or payment
association. In any case, it should be assumed that users will not always know
the correct point of contact, nor understand whether the problem is a hardware
or software problem, or an account related problem such as lack of funds.
While relationships and agreements may be in place between issuers and MNOs
to handle customer care, in general MNOs may not be aware of the payment
accounts a user has installed on his or her device, and issuers may not be aware
of the model and configuration of the user’s mobile device.
The mobile contactless payment application should not prevent support for
customer care enquires, such as providing identifiers to allow a user’s issuer and
account to be identified, and also to provide information about the configuration
of payment application and mobile device.

EMVCo Planned Actions
To assist with customer care interactions, EMVCo to consider defining standard
application labels and/or application commands which may be used to assist in
customer care.




October 2007      © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.           Page 19
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0




Page 20            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.   October 2007
EMV Mobile Contactless Payment
                                        Technical Issues and Position Paper Version 1.0




4       Usability

4.1      Introduction
Usability addresses concerns with the experience of the user who wants to use a
mobile device for proximity payment. Many aspects of the proximity payment
process, from provisioning and personalization of the mobile device to selecting
the desired credentials for payment, to performing the payment transaction, have
usability concerns associated with them. The goal in identifying these issues, and
in making recommendations to address these issues, is to ensure ease-of-use,
minimize confusion regarding device functionality, and to in general achieve a
level of consistency in the proximity payment user experience that will help
promote broad acceptance.


4.2      Transaction Experience Usability Issues
Transaction experience issues are those issues which involve the user interaction
with the mobile device when making a proximity payment. These include the
process for selecting and managing payment credentials, and how the device will
function when interacting with the POS terminal.


4.2.1       User Authentication / Cardholder Verification
Description
To prevent unauthorized use of a mobile device for proximity payment, it is
expected that some type of authentication process will be optionally available for
enabling the proximity payment functionality. This authentication may be for
cardholder verification, or it may be to lock or unlock the payment application for
use.
Although it is likely that most users may not make extensive use of this
lock/unlock process to secure their proximity payment credentials, just having it
available will provide the user with peace of mind that their device can be
secured.
One likely solution for user authentication would be through the entry of a
passcode set by the user, which would enable the payment application. Using a
numeric passcode as the authentication mechanism to enable the proximity
payment application is something that many users of today’s mobile devices
would already be familiar with.
Depending upon the requirements of the primary actors in the proximity
payment transaction (account issuers, merchants, card associations, etc),
authentication of the user could be required at different frequencies, including:
    •   Rarely, to simply enable use of the payment application




October 2007      © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.           Page 21
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


   •    Each time the user enables a particular set of payment credentials for
        making payments
   •    On a transaction by transaction basis
However, while this type of authentication process is certainly desirable, if it is
too complex, or requires the user to authenticate themselves to their device too
often, then it could be a disincentive for using the mobile device as a payment
device.
Also, the authentication process must utilize a secure entry method, and the
secure element as needed, to ensure that the authentication information can not
be recorded by another application running on the mobile device. STIP could be a
good answer to secure the passcode entry and its transfer to the secure element.

EMVCo Planned Actions
EMVCo to consider user interface requirements and application commands that
enable the locking and unlocking of a proximity payment application. These
commands should provide for convenient and secure application usage
management of multiple accounts contained on secure elements, including
options for locking policies such as frequency of application locking and locking
per application or for all applications.


4.2.2       Multiple payment applications on single device
Description
Many of the existing proximity payment systems have been designed around the
payment credentials being stored on a dedicated device, such as contactless
payment cards, key fobs or tags. These devices are supplied by the issuer, and
hence the number of payment credentials on the device is constrained in a well
defined manner.
Typically there will only a single set of credentials, or possibly a very small
number (for example, debit and credit), and these will be issued by a single issuer
for a single payment association. Under these conditions, payment credential
selection is performed by the user presenting a particular device to the reader.
The POS may cycle through the payment brands which are accepted at the
merchant until that available on the device is encountered. In the cases where
multiple credentials exist, these will usually be selected on the POS device.
This method of selection will not work in the case where multiple credentials
exist on a single device. Conceptually, the mobile device now acts like a physical
wallet in which multiple cards are stored. Bringing the mobile device into
proximity with the POS terminal is analogous to putting a wallet in proximity
and expecting the POS to correctly choose the correct card.




Page 22            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.     October 2007
EMV Mobile Contactless Payment
                                         Technical Issues and Position Paper Version 1.0


The mobile device needs to convey to the POS terminal information regarding
which of the payment credentials has been selected. One method of achieving this
is to present the available credentials, with an indication of the selection priority.
This would assist where not all of the available payment credentials on the
device are accepted by the merchant. The POS may select the highest priority
credentials which are accepted. This however requires that the POS terminal
currently expects the possibility of a multiplicity of credentials, and also that the
method of selection between the different payment applications and brands is
compatible. If protocols for exchange of the transaction credentials differ greatly
between payment applications it may be that if the presence one payment
application (or set of payment credentials) has been identified by the POS it will
be impossible to select a different payment application (or payment credentials).
In this case, the mobile device may need to implement a filter in order to only
make the selected payment credentials visible to the POS terminal.

EMVCo Planned Action
The contactless payment application must have a mechanism to enable the POS
to interact with the chosen payment application. It is expected that the PPSE
mechanism defined by the EMV Contactless Working Group should provide this
capability. This should include considerations of enhancing the PPSE as
appropriate to support the mobile payment environment.
EMVCo to consider defining commands for a user interface application to manage
the PPSE appropriately in order to reflect the user selection of the payment
instrument (see section 4.2.3 for more details).


4.2.3       Payment Credential Selection Process
Description
While the first mobile devices which are enabled for contactless payment will
contain only a single set of payment credentials, in future implementations it is
expected that each device will be able to hold multiple sets of payment
credentials. These multi-credential implementations will require some
mechanism for allowing the user to select which set of credentials to use for
completing a specific transaction.
This mechanism will likely involve the user interface application in conjunction
with the PPSE to allow the user to choose which set of credentials is to be used,
either on a transaction-by-transaction basis, or based on a preconfigured set of
user preferences.
If so desired, this sort of digital wallet application could possibly be enabled to
perform a variety of automatic credential selection functions on behalf of the
user, based on the amount of information available for each specific transaction,
the types of payment credentials accepted by the merchant, and a set of
predefined user preferences. For example, the user could set preferences such as:
   •    Default set of credentials to be used
   •    Priority order in which to use credentials for payment




October 2007       © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.           Page 23
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


The behaviour of the POS terminals needs to be defined so that it respects this
application selection mechanism, including in the case where the PPSE is not
present or does not contain the expected data.

EMVCo Planned Actions
EMVCo to account for the following set of considerations in the development of
User Interface requirements and best practices guidelines:
   •    Any payment application supporting multiple payment credentials should
        provide the user with the ability to select the set of credentials to be used
        on a transaction-by-transaction basis. It would also be desirable to allow
        the user to select a default set of credentials to be used, unless an
        alternate set of credentials is selected for a particular transaction.
   •    The interaction between the mobile device and the POS should not allow
        the merchant to override the user preferences and the behaviour of POS
        devices needs to be defined to respect the user preferences.
   •    Malicious readers seeking to attack the payment application need not
        follow the behaviour specified for a POS terminal, so mechanisms to
        prevent the activation of non-selected applications should be explored.
   •    It would also be useful if the payment application allows for the selection
        of a default set of credentials, to be used for any transaction in which the
        user has not chosen a specific set of credentials for completing that
        transaction.
   •    The mechanism for selection of a particular account when multiple
        contactless payment applications are available should be specified, but not
        the user interface (beyond “guidelines” and recommendations from
        EMVCo).
   •    The API which the mobile device must send to the contactless payment
        application for account selection should be standardised for
        interoperability between user interface applications and the payment
        application.


4.2.4       Payment Credential Availability with Device Off
Description
One key issue with using a mobile device as a proximity payment instrument is
whether the payment functionality could be available even if the device is
powered off, and whether or not operation should be allowed in this case.
Technically, it is feasible to support proximity payment when the mobile device is
not powered; the nature of the proximity modem technology is such that the POS
device can provide the power necessary to enable a transaction to be completed.
Whether or not such operation should be allowed, however, is a more contentious
issue, with arguments being made both for and against doing so.
Potential concerns and issues that have been identified regarding having the
mobile device proximity payment capabilities operational when the device is not
powered include:



Page 24            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.     October 2007
EMV Mobile Contactless Payment
                                        Technical Issues and Position Paper Version 1.0


   •   Since off-network lost or stolen device credentials can’t be deleted OTA,
       the user could have concerns that unauthorized transactions could be
       made, even if the liability is limited, which might cause them to avoid
       using the device as a payment instrument. This could be a valid concern
       for off-line POS transactions.
   •   If the device is powered off, there would be no way for a user to designate
       that a specific set of payment credentials be used (in multi-credential
       systems); unless a default set of credentials has been previously selected
       for use, the device would not be usable as a payment instrument.
   •   There may be account issuers who want more control over the
       management of credentials stored in a mobile device, who may argue
       against allowing credentials to be used unless the device is on-line, and
       some level of routine authentication is performed.
   •   It would not be possible to immediately indicate to the user that a
       transaction has taken place (e.g. no sound or flashing lights), so the user
       would need to rely on only the indication from the POS device that the
       transaction was successful.
   •   Any related branding opportunity that relied on the mobile device being
       powered up would be lost.
   •   There may be risk issues if powering down the phone bypasses security
       settings (such as a lock code) that the user has selected.
Arguments for having the proximity payment capabilities enabled even when the
device is powered down include:
   •   If the mobile device cannot be used if powered down, then users will not
       rely on it as a payment instrument; instead, they will rely on more
       traditional payment mechanisms, rather than having to worry about
       whether their mobile device will “work” if power is lost.
   •   Other form factors used for proximity payment are passive, so the user’s
       expectation might be that the same should be possible with mobile
       devices.

EMVCo Planned Actions
There is not a hard requirement that proximity payment functionality must work
when the device is powered off.
However EMVCo to consider requirements for the mobile contactless payment
application operating when the device is powered down. Such considerations
include:
   •   Having a default application selection method, possibly based on the
       power state of the mobile device;
   •   Detection of power state and restricting functionality accordingly.




October 2007      © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.           Page 25
EMV Mobile Contactless Payment
Technical Issues and Position Paper Version 1.0


4.3       Branding
The brands associated with the issuer and payment scheme are an important
element in deploying a mobile proximity payment solution. It is expected that
branding will primarily be through the user interface, rather than physical
branding on the mobile device or secure element.


4.3.1       Branding via the User Interface
Description
Service providers (banks, petrol stations, etc.) have two possible opportunities to
dialog with the user and display their brands:
   •    During the operation of the application (e.g. loading of tickets, reloading of
        the e-purse, checking of the loyalty points left).
   •    During the contactless transaction itself.
Some action by the user may be needed, depending on the application (selecting a
payment instrument, enter PIN code). At the end of the transaction, a brand
could be displayed to the user via the UI.
There could also be different branding requirements from different service
providers. For example, branding could be visual and/or audio.
Depending on the technology used for the UI, it may or may not be possible to
display a brand. For example, the USIM Toolkit is very limited, and might not
support the display of a brand, whereas a browsing solution or Java solution
provides better ergonomic ability for branding.

EMVCo Planned Actions
EMVCo to consider how the mobile contactless payment application should
provide a mechanism to the mobile device to indicate when branding should be
displayed, and what branding should be displayed.
This may include flags to indicate the success of the transfer of information from
the mobile device to the POS terminal and standard elements to identify which
branding element should be displayed.




Page 26            © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.     October 2007
EMV Mobile Contactless Payment
                                     Technical Issues and Position Paper Version 1.0




                      <<< END OF DOCUMENT >>>




October 2007   © 2007 EMVCo, LLC (“EMVCo”). All rights reserved.           Page 27

More Related Content

Viewers also liked

payment habits and trends in the changing e-landscape 2010+
payment habits and trends in the changing e-landscape 2010+payment habits and trends in the changing e-landscape 2010+
payment habits and trends in the changing e-landscape 2010+Boni
 
Livelihood changes enabled by mobile phones the case of tanzanian fishermen
Livelihood changes enabled by mobile phones   the case of tanzanian fishermenLivelihood changes enabled by mobile phones   the case of tanzanian fishermen
Livelihood changes enabled by mobile phones the case of tanzanian fishermenBoni
 
social enterprise a new model for poverty reduction and employment generation
social enterprise a new model for poverty reduction and employment generationsocial enterprise a new model for poverty reduction and employment generation
social enterprise a new model for poverty reduction and employment generationBoni
 
mobile financial games
mobile financial gamesmobile financial games
mobile financial gamesBoni
 
Okan Universitesi, Mobil Yasam ve Uygulamalar Konferansı
Okan Universitesi, Mobil Yasam ve Uygulamalar KonferansıOkan Universitesi, Mobil Yasam ve Uygulamalar Konferansı
Okan Universitesi, Mobil Yasam ve Uygulamalar KonferansıBoni
 
2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail payments2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail paymentsBoni
 
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...Boni
 

Viewers also liked (7)

payment habits and trends in the changing e-landscape 2010+
payment habits and trends in the changing e-landscape 2010+payment habits and trends in the changing e-landscape 2010+
payment habits and trends in the changing e-landscape 2010+
 
Livelihood changes enabled by mobile phones the case of tanzanian fishermen
Livelihood changes enabled by mobile phones   the case of tanzanian fishermenLivelihood changes enabled by mobile phones   the case of tanzanian fishermen
Livelihood changes enabled by mobile phones the case of tanzanian fishermen
 
social enterprise a new model for poverty reduction and employment generation
social enterprise a new model for poverty reduction and employment generationsocial enterprise a new model for poverty reduction and employment generation
social enterprise a new model for poverty reduction and employment generation
 
mobile financial games
mobile financial gamesmobile financial games
mobile financial games
 
Okan Universitesi, Mobil Yasam ve Uygulamalar Konferansı
Okan Universitesi, Mobil Yasam ve Uygulamalar KonferansıOkan Universitesi, Mobil Yasam ve Uygulamalar Konferansı
Okan Universitesi, Mobil Yasam ve Uygulamalar Konferansı
 
2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail payments2007 12 - understanding risk management in emerging retail payments
2007 12 - understanding risk management in emerging retail payments
 
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...
bell dourish-yesterdays tomorrows - notes on ubiuitous computings dominant vi...
 

Similar to 2007 11 - emv mobile contactless payment technical issues version 1.0 final

emv mobile contactless payment white paper version 1.0 final
emv mobile contactless payment white paper version 1.0 finalemv mobile contactless payment white paper version 1.0 final
emv mobile contactless payment white paper version 1.0 finalBoni
 
2007 11 - emv mobile contactless payment white paper version 1.0 final
2007 11 - emv mobile contactless payment white paper version 1.0 final2007 11 - emv mobile contactless payment white paper version 1.0 final
2007 11 - emv mobile contactless payment white paper version 1.0 finalBoni
 
2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product DescriptionSzymon Dowgwillowicz-Nowicki
 
Application development for mobile phones
Application development for mobile phonesApplication development for mobile phones
Application development for mobile phonesSanjeev Kumar Jaiswal
 
HCE_and_SIM_Secure_Element
HCE_and_SIM_Secure_ElementHCE_and_SIM_Secure_Element
HCE_and_SIM_Secure_ElementNick Norman
 
Mbh multi co-s positioning paper 2012011
Mbh multi co-s positioning paper 2012011Mbh multi co-s positioning paper 2012011
Mbh multi co-s positioning paper 2012011shivlu
 
Nfc forum mobile_nfc_ecosystem_white_paper
Nfc forum mobile_nfc_ecosystem_white_paperNfc forum mobile_nfc_ecosystem_white_paper
Nfc forum mobile_nfc_ecosystem_white_papercoolhand290
 
Epc mobile payments whitepaper
Epc mobile payments whitepaperEpc mobile payments whitepaper
Epc mobile payments whitepaperBoni
 
2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc servicesBoni
 
2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc servicesBoni
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security SystemIRJET Journal
 
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMSMOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMSKuldeep Jain
 
E-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemE-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemAbhishek Kumar
 
Sim based mobile wallet
Sim based mobile walletSim based mobile wallet
Sim based mobile walletJobin Jose
 
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...Axel Nennker
 

Similar to 2007 11 - emv mobile contactless payment technical issues version 1.0 final (20)

emv mobile contactless payment white paper version 1.0 final
emv mobile contactless payment white paper version 1.0 finalemv mobile contactless payment white paper version 1.0 final
emv mobile contactless payment white paper version 1.0 final
 
2007 11 - emv mobile contactless payment white paper version 1.0 final
2007 11 - emv mobile contactless payment white paper version 1.0 final2007 11 - emv mobile contactless payment white paper version 1.0 final
2007 11 - emv mobile contactless payment white paper version 1.0 final
 
2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description2012 Accumulate Mobile Everywhere - Standard Product Description
2012 Accumulate Mobile Everywhere - Standard Product Description
 
Application development for mobile phones
Application development for mobile phonesApplication development for mobile phones
Application development for mobile phones
 
HCE_and_SIM_Secure_Element
HCE_and_SIM_Secure_ElementHCE_and_SIM_Secure_Element
HCE_and_SIM_Secure_Element
 
Mbh multi co-s positioning paper 2012011
Mbh multi co-s positioning paper 2012011Mbh multi co-s positioning paper 2012011
Mbh multi co-s positioning paper 2012011
 
Nfc forum mobile_nfc_ecosystem_white_paper
Nfc forum mobile_nfc_ecosystem_white_paperNfc forum mobile_nfc_ecosystem_white_paper
Nfc forum mobile_nfc_ecosystem_white_paper
 
Epc mobile payments whitepaper
Epc mobile payments whitepaperEpc mobile payments whitepaper
Epc mobile payments whitepaper
 
2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services
 
2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services2007 09 - gsma - mobile nfc services
2007 09 - gsma - mobile nfc services
 
IRJET - Anti-Fraud ATM Security System
IRJET  - Anti-Fraud ATM Security SystemIRJET  - Anti-Fraud ATM Security System
IRJET - Anti-Fraud ATM Security System
 
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMSMOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
MOBILE RECHARGING WITH BANKING TRANSACTION USING SMS
 
Project falcon1
Project falcon1Project falcon1
Project falcon1
 
E-Commerce Mobile Sale System
E-Commerce Mobile Sale SystemE-Commerce Mobile Sale System
E-Commerce Mobile Sale System
 
NFC Basic Concepts
NFC Basic ConceptsNFC Basic Concepts
NFC Basic Concepts
 
Black book converted
Black book convertedBlack book converted
Black book converted
 
Black book converted
Black book convertedBlack book converted
Black book converted
 
Rami Yasser C.V
Rami Yasser C.VRami Yasser C.V
Rami Yasser C.V
 
Sim based mobile wallet
Sim based mobile walletSim based mobile wallet
Sim based mobile wallet
 
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
From plastic to secured bits. A mobile wallet for virtual cards on the mobil...
 

More from Boni

beacon summit berlin, boni presentation about mall solution, merchant app, an...
beacon summit berlin, boni presentation about mall solution, merchant app, an...beacon summit berlin, boni presentation about mall solution, merchant app, an...
beacon summit berlin, boni presentation about mall solution, merchant app, an...Boni
 
Boni
BoniBoni
BoniBoni
 
Webinar presentation-for-web
Webinar presentation-for-webWebinar presentation-for-web
Webinar presentation-for-webBoni
 
Mobile learning transforming the delivery of education and training
Mobile learning transforming the delivery of education and trainingMobile learning transforming the delivery of education and training
Mobile learning transforming the delivery of education and trainingBoni
 
Mobile phone - The new way to pay
Mobile phone - The new way to payMobile phone - The new way to pay
Mobile phone - The new way to payBoni
 
Mobile Money Definitions
Mobile Money DefinitionsMobile Money Definitions
Mobile Money DefinitionsBoni
 
contactless mobile payments
contactless mobile paymentscontactless mobile payments
contactless mobile paymentsBoni
 
The unwired continent - africas mobile success story
The unwired continent - africas mobile success storyThe unwired continent - africas mobile success story
The unwired continent - africas mobile success storyBoni
 
Role of icts as enabler for agriculture and small scale farmers
Role of icts as enabler for agriculture and small scale farmersRole of icts as enabler for agriculture and small scale farmers
Role of icts as enabler for agriculture and small scale farmersBoni
 
Organic business guide developing sustainable value chains with smallholders
Organic business guide   developing sustainable value chains with smallholdersOrganic business guide   developing sustainable value chains with smallholders
Organic business guide developing sustainable value chains with smallholdersBoni
 
Inventory of innovative farmer advisory services using ic ts
Inventory of innovative farmer advisory services using ic tsInventory of innovative farmer advisory services using ic ts
Inventory of innovative farmer advisory services using ic tsBoni
 
E agriculture - a definition and profile of its application
E agriculture - a definition and profile of its applicationE agriculture - a definition and profile of its application
E agriculture - a definition and profile of its applicationBoni
 
Do sustainable livelihoods approaches have a positive impact of the rural poo...
Do sustainable livelihoods approaches have a positive impact of the rural poo...Do sustainable livelihoods approaches have a positive impact of the rural poo...
Do sustainable livelihoods approaches have a positive impact of the rural poo...Boni
 
smart card alliance - mobile payment business model research report on stakeh...
smart card alliance - mobile payment business model research report on stakeh...smart card alliance - mobile payment business model research report on stakeh...
smart card alliance - mobile payment business model research report on stakeh...Boni
 
near field interactions with the internet of things
near field interactions with the internet of thingsnear field interactions with the internet of things
near field interactions with the internet of thingsBoni
 
contactless commerce enables a world beyond payment cards
contactless commerce enables a world beyond payment cardscontactless commerce enables a world beyond payment cards
contactless commerce enables a world beyond payment cardsBoni
 
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...Boni
 
smart card alliance - proximity mobile payments - leveraging nfc and the cont...
smart card alliance - proximity mobile payments - leveraging nfc and the cont...smart card alliance - proximity mobile payments - leveraging nfc and the cont...
smart card alliance - proximity mobile payments - leveraging nfc and the cont...Boni
 
the mobile generation - global transformations at the cellular level
the mobile generation - global transformations at the cellular levelthe mobile generation - global transformations at the cellular level
the mobile generation - global transformations at the cellular levelBoni
 
china vas - mobile value added services in china
china vas - mobile value added services in chinachina vas - mobile value added services in china
china vas - mobile value added services in chinaBoni
 

More from Boni (20)

beacon summit berlin, boni presentation about mall solution, merchant app, an...
beacon summit berlin, boni presentation about mall solution, merchant app, an...beacon summit berlin, boni presentation about mall solution, merchant app, an...
beacon summit berlin, boni presentation about mall solution, merchant app, an...
 
Boni
BoniBoni
Boni
 
Webinar presentation-for-web
Webinar presentation-for-webWebinar presentation-for-web
Webinar presentation-for-web
 
Mobile learning transforming the delivery of education and training
Mobile learning transforming the delivery of education and trainingMobile learning transforming the delivery of education and training
Mobile learning transforming the delivery of education and training
 
Mobile phone - The new way to pay
Mobile phone - The new way to payMobile phone - The new way to pay
Mobile phone - The new way to pay
 
Mobile Money Definitions
Mobile Money DefinitionsMobile Money Definitions
Mobile Money Definitions
 
contactless mobile payments
contactless mobile paymentscontactless mobile payments
contactless mobile payments
 
The unwired continent - africas mobile success story
The unwired continent - africas mobile success storyThe unwired continent - africas mobile success story
The unwired continent - africas mobile success story
 
Role of icts as enabler for agriculture and small scale farmers
Role of icts as enabler for agriculture and small scale farmersRole of icts as enabler for agriculture and small scale farmers
Role of icts as enabler for agriculture and small scale farmers
 
Organic business guide developing sustainable value chains with smallholders
Organic business guide   developing sustainable value chains with smallholdersOrganic business guide   developing sustainable value chains with smallholders
Organic business guide developing sustainable value chains with smallholders
 
Inventory of innovative farmer advisory services using ic ts
Inventory of innovative farmer advisory services using ic tsInventory of innovative farmer advisory services using ic ts
Inventory of innovative farmer advisory services using ic ts
 
E agriculture - a definition and profile of its application
E agriculture - a definition and profile of its applicationE agriculture - a definition and profile of its application
E agriculture - a definition and profile of its application
 
Do sustainable livelihoods approaches have a positive impact of the rural poo...
Do sustainable livelihoods approaches have a positive impact of the rural poo...Do sustainable livelihoods approaches have a positive impact of the rural poo...
Do sustainable livelihoods approaches have a positive impact of the rural poo...
 
smart card alliance - mobile payment business model research report on stakeh...
smart card alliance - mobile payment business model research report on stakeh...smart card alliance - mobile payment business model research report on stakeh...
smart card alliance - mobile payment business model research report on stakeh...
 
near field interactions with the internet of things
near field interactions with the internet of thingsnear field interactions with the internet of things
near field interactions with the internet of things
 
contactless commerce enables a world beyond payment cards
contactless commerce enables a world beyond payment cardscontactless commerce enables a world beyond payment cards
contactless commerce enables a world beyond payment cards
 
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...
a manifesto for networked objects — cohabiting with pigeons, arphids and aibo...
 
smart card alliance - proximity mobile payments - leveraging nfc and the cont...
smart card alliance - proximity mobile payments - leveraging nfc and the cont...smart card alliance - proximity mobile payments - leveraging nfc and the cont...
smart card alliance - proximity mobile payments - leveraging nfc and the cont...
 
the mobile generation - global transformations at the cellular level
the mobile generation - global transformations at the cellular levelthe mobile generation - global transformations at the cellular level
the mobile generation - global transformations at the cellular level
 
china vas - mobile value added services in china
china vas - mobile value added services in chinachina vas - mobile value added services in china
china vas - mobile value added services in china
 

Recently uploaded

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 

2007 11 - emv mobile contactless payment technical issues version 1.0 final

  • 1. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 October 2007
  • 2. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Page ii © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 3. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 October 2007 © 1994-2007 EMVCo, LLC (“EMVCo”). All rights reserved. Any and all uses of the EMV Specifications (“Materials”) shall be permitted only pursuant to the terms and conditions of the license agreement between the user and EMVCo found at http://www.emvco.com/specifications.cfm.
  • 4. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Page ii © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 5. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Contents 1 Introduction......................................................................................................... 1 1.1 Document Purpose and Scope...................................................................... 1 1.2 References..................................................................................................... 2 1.3 Definitions .................................................................................................... 2 1.4 Mobile Device Architecture.......................................................................... 4 1.4.1 Logical Architecture .............................................................................. 4 1.5 Proximity Payment Architecture................................................................. 6 1.6 Implementation Options for the Secure Element....................................... 7 1.6.1 Embedded Hardware Secure Element ................................................. 8 1.6.2 Secure Element on UICC ...................................................................... 8 1.6.3 Removable Hardware Secure Element................................................. 8 1.6.4 Secure Element in Mobile Device Baseband Processor....................... 8 2 Provisioning and Personalization ...................................................................... 9 2.1 Introduction .................................................................................................. 9 2.2 Possible Options for Device Provisioning and Personalisation.................. 9 2.3 Provisioning and Personalisation of the Secure Element ........................ 10 2.3.1 Embedded Hardware SE..................................................................... 10 2.3.2 SE on UICC.......................................................................................... 10 2.3.3 Removable Hardware Security Element ............................................ 11 2.3.4 SE in baseband processor.................................................................... 11 2.3.5 Summary.............................................................................................. 11 2.3.6 Separation of Provisioning and Personalisation................................ 12 2.3.7 Pre-distribution personalization......................................................... 12 2.4 Post-distribution Payment Application Provisioning Process Issues...... 12 2.4.1 Payment Application / Credentials Installation Process................... 12 2.4.2 Update of Payment Application and Credentials .............................. 14 2.4.3 Payment Application and Credentials Deletion ................................ 15 2.4.4 Device Change with Embedded Secure Element............................... 16 2.4.5 Device Change with Removable Secure Element .............................. 16 2.4.6 User Interface Application Provisioning ............................................ 17 3 Customer Care .................................................................................................. 19 4 Usability ............................................................................................................ 21 4.1 Introduction ................................................................................................ 21 4.2 Transaction Experience Usability Issues.................................................. 21 4.2.1 User Authentication / Cardholder Verification.................................. 21 4.2.2 Multiple payment applications on single device................................ 22 4.2.3 Payment Credential Selection Process............................................... 23 4.2.4 Payment Credential Availability with Device Off ............................. 24 October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page iii
  • 6. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 4.3 Branding ..................................................................................................... 26 4.3.1 Branding via the User Interface ......................................................... 26 Page iv © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 7. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Tables Table 1 Summary of Provisioning and Personalization Options for Secure Elements 11 October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page v
  • 8. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Page vi © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 9. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Figures Figure 1: Logical Architecture of a Mobile Device 4 Figure 2: Example implementation of logical interfaces 5 Figure 3: Another example implementation of logical interfaces 6 Figure 4: Mobile Contactless Payment Architecture 7 October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page vii
  • 10. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Page viii © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 11. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 1 Introduction 1.1 Document Purpose and Scope The increased deployment of contactless payment infrastructure, combined with the increased interest in adding contactless capability to mobile devices leads to the natural combination of contactless payment in mobile devices. This document sets out the EMVCo position on technical issues related to implementing contactless payment in a mobile device. The document identifies technical issues and the response EMVCo will make to address these issues. Specifically, the document will address identified mobile contactless payment ecosystems issues in the following categories: • Provisioning and Personalization of the secure element on a mobile platform with the contactless payment application. o The entire processes of pre-distribution, post-distribution application installation, update, and deletion will be reviewed; and, o Additionally, topics of device changes with embedded or removable secure elements, as well as considerations associated with the provisioning of the User Interface Application will also be reviewed. • Possible technical assistance to help address Customer care will be reviewed. • Usability of mobile device for contactless payment including: o User Authentication and Cardholder Verification; o Multiple payment applications on a single mobile device; o Payment Credential selection process; o Payment Credential availability with device off; and, o Branding via the User Interface. The document confines itself to technical discussion, and does not address issues such as business relationships which may need to be formed to support the deployment of contactless payment in mobile devices. This document draws from many of the issues identified in the Mobile Payment Forum document, “Mobile Proximity Payment Issues and Recommendations” [MPIR], considering them in an EMVCo context. Additional issues and concerns are also documented. October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 1
  • 12. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 1.2 References [14443] ISO/IEC 14443: Identification cards -- Contactless integrated circuit(s) cards -- Proximity cards, www.iso.org [MPAF] Mobile Payments Architectural framework and Use Cases, Version 1.0, Mobile Payment Forum, www.mobilepaymentforum.org [NFC] ISO/IEC 18092: Information technology -- Telecommunications and information exchange between systems -- Near Field Communication -- Interface and Protocol (NFCIP-1), www.iso.org [PPTA] Proximity Payment Technology Assessment, Version 1.0, Mobile Payment Forum, www.mobilepaymentforum.org [RADP] Requirements for Application Download and Personalization, Mobile Payment Configuration and Maintenance, Version 1.0, Mobile Payment Forum, www.mobilepaymentforum.org [SATS] Security and Trust Services API (SATSA) for Java™ 2 Platform, Micro Edition, Version 1.0, JSR 177 Expert Group, Java Community Process (JCP), www.jcp.org [STIP] STIP Core Framework Technology, A Technical Specification, Version 2.2, GlobalPlatform, www.globalplatform.org [GPCS] GlobalPlatform Card Specification, versions 2.1.1 & 2.2, GlobalPlatform, www.globalplatform.org [MPIR] Mobile Proximity Payment Issues and Recommendations, Version 1.0, Mobile Payment Forum, www.mobilepaymentforum.org 1.3 Definitions API Application Program Interface ATM Automated Teller Machine BIP Bearer Independent Protocol CDMA Code Division Multiple Access CLWG EMVCo Contactless Working Group Contactless RF Generic term for multiple varieties of short- range RF communication technology CPS EMV Card Personalisation Specification GP GlobalPlatform GPRS General Packet Radio System GSM Global System for Mobile communications Page 2 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 13. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 JCP Java Community Process JSR Java Specification Request LAN Local Area Network MMI Man-Machine Interface MMS Multimedia Messaging MNO Mobile Network Operator NFC Near-Field Communication OMA Open Mobile Alliance OTA Over-the-Air PAN Personal Area Network PDA Personal Digital Assistant PIN Personal Identification Number POS Point of Sale PPSE A list of all Combinations supported by the Contactless Card. PPSE (Proximity Payment System Environment) is used in Entry Point Selection Process. Proximity Payment A payment where the consumer is physically present at the point of sale. RF Radio Frequency RFID Radio Frequency IDentification RUIM Removable Universal Identity Module SATSA Security And Trust Services API SE Secure Element SIM Subscriber Identity Module SSO Single Sign On STIP Small Terminal Interoperability Platform STK SIM Tool Kit SMC Secure Multimedia Card UI User Interface UICC Universal Integrated Circuit Card UMTS Universal Mobile Telephone System URL Uniform Resource Locator USIM Universal Subscriber Identity Module October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 3
  • 14. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 WLAN Wireless Local Area Network 1.4 Mobile Device Architecture 1.4.1 Logical Architecture The logical architecture assumed for the mobile device is shown in Figure 1. Secure Element Secure Element Figure 1: Logical Architecture of a Mobile Device The mobile device consists of the following logical components, a mobile platform, and one or more secure elements. The secure element is where one or more payment applications are hosted, and provides a secure area for the execution of the applications and protection of the payment assets (e.g. payment data, keys, the payment application code). The secure element may also host applications which are not related to payment. Page 4 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 15. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 The mobile platform is the device in which the secure element is hosted, and also contains other components such as a user interface (UI) for both input and output, an application environment (such as a Java or other virtual machine, or the native operating system of the mobile device), a proximity modem (based on EMV contactless level 1 or other compatible standard), and a wide-area modem. In the context of this document, the wide-area modem is likely to be a cellular modem, however it could also be a wired modem, or wireless LAN. The secure element and the mobile platform provide logical interfaces between the payment application and the user interface, between the payment application and the application environment, between the payment application and proximity modem, and between the payment application and the wide area modem. In practice, the logical interfaces may be implemented via other elements within the mobile platform. For example, the payment application to UI interface may be implemented via a user interface application present in the application environment on the mobile platform. This situation is illustrated in Figure 2: where the interfaces between the payment application and the user interface and payment application and wide area modem are established via applications running in the application environment. Figure 2: Example implementation of logical interfaces In the example given in Figure 2: the user interface application needs to be installed on the mobile platform. Another example given in Figure 3 is the secure element includes the contactless modem, e.g. a NFC chip incorporating a secure element or a secure element directly handling the contactless protocol and directly connected to the contactless antenna. October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 5
  • 16. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Mobile Platform Application Environment Wide area User Interface modem Secure Element Payment Contactless application Payment modem application Figure 3: Another example implementation of logical interfaces 1.5 Proximity Payment Architecture A block diagram showing the architecture of a mobile contactless payment system is given in Figure 4: . Page 6 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 17. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Contactless Interface Merchant Point of Mobile device Sale Device Provisioning / Side channel Personalisation Issuer Acquirer Authorization and clearing network Figure 4: Mobile Contactless Payment Architecture The mobile device holds a contactless payment application. The payment account issuer will provision and personalise the contactless payment application on the mobile device. There may also be a side channel link between the issuer and the mobile device for updating of payment application information (such as EMV scripts). The mobile device communicates with a merchant point of sale device over the contactless interface to allow the contactless payment application to perform a transaction. The merchant is connected to an acquirer, and through an authorization and clearing network to the issuer. EMVCo standards will ensure that the merchant POS infrastructure for accepting mobile contactless payment converges with the EMV Common Contactless Communications Protocol and so are not considered further in this document. 1.6 Implementation Options for the Secure Element Four implementation options for the secure element have been identified at this point. It is possible that additional implementation options will be available to device implementers in the future; if so, these additional implementations will need to provide appropriate security services for supporting proximity payment. October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 7
  • 18. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 1.6.1 Embedded Hardware Secure Element The secure element may be a hardware tamper resistant module which is embedded in the mobile device. For example this may be a component such as a smartcard chip which is soldered on the circuit board of the mobile platform or a secure core on an NFC chip. 1.6.2 Secure Element on UICC The secure element may be in the UICC, the smartcard which hosts the application used for identification for mobile telephony purposes (such as the USIM or RUIM). 1.6.3 Removable Hardware Secure Element The secure element may be a removable hardware element, such as smartcard, or a secure core on a multimedia card. In many ways this is similar to the removable UICC option described above, however it is not associated with the particular mobile subscription, nor does it need to support telephony services for the mobile device. 1.6.4 Secure Element in Mobile Device Baseband Processor The secure element may be hosted as part of the baseband processor (that is, the multipurpose processor which powers the mobile device) using portions of secure memory and processing. This is potentially a longer term solution. It is expected that the options described in sections 1.6.1 Embedded Hardware Secure Element and 1.6.2 Secure Element on UICC will be the dominant options in the short term, with the option described in section 1.6.4 Secure Element in Mobile Device Baseband Processor being a longer term opportunity. Page 8 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 19. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 2 Provisioning and Personalization 2.1 Introduction Traditionally cards and other tokens carrying an EMV payment application are single purpose tokens1, provided to the user by an issuer with the express intent that the token is used for payment. Such tokens are typically provisioned and personalised before the personalised token is delivered to the cardholder. As the token is provided by the issuer, the issuer knows the characteristics of the token (such as token type, operating system, and provisioning method) as the issuer has specified these to the supplier. A mobile device on the other hand is a general purpose device, one of its uses possibly being mobile proximity payment. Typically the mobile device is not provided by an issuer, and the lifecycle of the mobile device is separate from that of any payment application or payment data. As the issuer may not have been involved in the procurement of the mobile device, the issuer may have little influence on the characteristics of the mobile device, such as operating system, and will likely have to support provisioning and personalisation of a range of devices which may have differing characteristics. A new factor in the provisioning and personalisation of mobile devices is that the mobile device may have a user interface application, which also needs to be provisioned, and which needs to interact with the payment application. This user interface application will need to adapt to different mobile device characteristics such as application environment and screen capabilities. Device provisioning involves the delivery of the contactless payment application and personalization credentials necessary for a mobile device to be used as an instrument for making contactless payments, as well as any User Interface application. To provision a mobile device with the necessary information, a variety of security- and privacy-related issues must be addressed, in addition to other issues related to the process of managing the lifecycle of the payment credentials. 2.2 Possible Options for Device Provisioning and Personalisation There are a number of approaches to provisioning and personalisation of the secure element. There are four main processes: 1The token may be a multi-application token, however the other applications are generally known beforehand. October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 9
  • 20. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 • The first is to provision the payment application code on the secure element. • The second is to personalise the payment application with account details. • The third is provisioning the user interface application on the mobile device. • The fourth is personalising the user interface application with any account specific details. These processes may occur separately or together. They may also occur before or after the distribution of the mobile device and secure element. In considering provisioning and personalisation of a mobile device, it needs to be remembered that before the issuing of the mobile device it may be unknown whether the device will be used for payment, and which issuer(s) may need to personalise the device. 2.3 Provisioning and Personalisation of the Secure Element The sections below consider the different options of the secure element, and whether they are suited to provisioning and personalisation before or after distribution. 2.3.1 Embedded Hardware SE Provisioning of the payment application may occur before distribution (provided the payment application is suitable for candidate issuers, and is sufficiently likely to be used to justify the costs of doing so), or may occur after the mobile device is provided to the end user. Unless issuers are prepared to provide cardholders with mobile devices, the personalisation of the mobile device will need to be performed after the device is provided to the end user. 2.3.2 SE on UICC The UICC is a removable element, which provides for provisioning and personalisation to be done either before the distribution of the USIM to the cardholder, or after the distribution. A UICC is provided by the cardholder’s mobile network operator, thus if it is to be provisioned and/or personalised for payment before the UICC is distributed to the user by the MNO, then agreements must be in place between the MNO and payment issuers before the UICC is sent out. Page 10 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 21. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 2.3.3 Removable Hardware Security Element A removable hardware security element is not controlled by the MNO in the same way that a UICC is. It may be controlled by a payment issuer in much the same way as any other contactless payment form-factor. This makes the removable hardware secure element a candidate for provisioning and personalisation before distribution, although it may also be provisioned or personalised after distribution. 2.3.4 SE in baseband processor Implementing a secure element inside a baseband processor is in many ways similar to having an embedded hardware secure element in terms of provisioning and personalisation. Provisioning may be performed before distribution, or after distribution. Personalisation will need to be performed post-distribution. 2.3.5 Summary Table 1 Summary of Provisioning and Personalization Options for Secure Elements Provisioning of Payment Personalisation of Application Account Information Pre- Post- Pre- Post- distribution distribution distribution distribution Embedded Hardware SE SE on UICC SE on removable hardware SE in baseband processor October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 11
  • 22. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 2.3.6 Separation of Provisioning and Personalisation Provisioning and personalisation may occur simultaneously or separately. For example, an issuer may load both the payment application and personalisation information into a secure element. On the other hand, a secure element may have the payment application installed before distribution (for example, burnt into ROM), and then be instantiated and personalised after distribution. It should be possible to have a single application in ROM which could be used by a range of issuers. EMVCo Planned Action: EMVCo to consider a functional requirement that provisioning and personalisation of the contactless payment application can be in a single or separate sessions. Additionally, the EMVCo CLWG is to ensure there is a standard mechanism to personalise a contactless payment application based on EMV CPS. 2.3.7 Pre-distribution personalization The processes for personalisation which occurs pre-distribution are very similar to those currently used for cards and other similar form-factors such as key fobs, and so is not considered in further detail in this document. 2.4 Post-distribution Payment Application Provisioning Process Issues This section details the issues related to the process of managing the lifecycle of the payment credentials, apart from those directly related to security. 2.4.1 Payment Application / Credentials Installation Process Description Provisioning and personalisation of the payment application post-distribution require a connection from the issuer personalisation bureau to the mobile device. This may be provided over a number of different media. Examples include: • Using the wide area cellular network, with an appropriate mobile client application to route the provisioning and personalisation data to the secure element. • Using the contactless interface at a provisioning point. The provisioning point provides the connectivity to the personalisation bureau. Such provisioning points could be placed in a bank branch, at an ATM or other such locations. Page 12 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 23. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 • Using a connected device such as a PC to establish a connection with a personalisation bureau and to transfer the data via a conduit to the mobile device (similar to synchronising phone book or email data with a PC). Regardless of the medium used to transfer the provisioning and personalisation data, there are a number of common elements that need to be considered. The personalisation bureau needs a protocol to provision the payment application on the secure element. This protocol is likely to be tied to the operating system of the secure element. As post-distribution personalisation will not occur in the same physically secure environment as that provided by a traditional personalisation bureau, this protocol must provide sufficient security for carrying the data over open networks. A number of such protocols exist, and may be reused. GlobalPlatform provides such protocols and GSM 03.48 provides secure messaging for USIM based secure elements. These may be used in conjunction with EMV CPS in order to provide a secure delivery mechanism. EMVCo Planned Action EMVCo will consider how EMV CPS may be used with secure messaging protocols such as those of GP and GSM 03.48 in a mobile environment. If necessary, EMVCo will consider enhancing CPS to provide the necessary capabilities for the mobile environment, and providing best practice guidelines as appropriate. Once a payment application is loaded on the secure element there may be a need to register the application in some way in order to make it available for selection, for example, it may need to be registered with the PPSE. EMVCo Planned Action EMVCo to consider developing requirements of standard methods for registering a new application on a Secure Element, and collaborating with other bodies such as GlobalPlatform to define the appropriate method and mechanism for registration. Determining the level of user interaction that should be required/allowed during the provisioning process, particularly during account or application updates - asking for user acknowledgement or approval during an update might cause a delay in the process, while not doing so could result in the user contacting customer service to inquire about the nature of the change. Assuring the user that a valid payment application and payment credentials have been installed on the device – since an OTA transfer of payment information is largely invisible to the user, some mechanism will be needed to inform the user that the payment credentials are ready to use, and that the credentials are authentic and valid. October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 13
  • 24. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 EMVCo Planned Action EMVCo to consider developing User Interface requirements to assist the user in securely managing and monitoring the processes for provisioning, personalisation and update of the payment application on a Secure Element in a mobile device. A number of the standard operating systems which may be used for secure elements have a number of implementation options. Payment associations or other service providers (including those outside of the payment area) may require specific configurations of the operating system. In the traditional card world this can be catered for by using a particular configuration based on the application to be placed on the card. In the case of mobile payment, the secure element will be shared by many applications, and cannot be customised to a particular application. EMVCo Planned Action EMVCo to consider identifying the requirements of a standard configuration of operating systems to support contactless payment applications, and to work with other industries to develop a de-facto standard. 2.4.2 Update of Payment Application and Credentials As with traditional credit cards, the payment instruments installed in mobile devices for proximity payment will need to be updated as their expiration date nears. Parameters within the payment application may also need to be reset. The process should be able to be made transparent to the user, although user notification may be desirable for certain updates. EMV Scripts and post-distribution personalisation mechanisms such as EMV CPS should be used for updating data objects. In order to apply these mechanisms, there must be a mechanism for the payment application to interact with the issuer host system. Periodically there may be a need to update the payment application to a new version, whether due to a change in the specifications, to offer enhanced functionality, to fix bugs or provide additional security. In this case removal and reprovisioning and personalisation of the payment application is necessary. EMVCo Planned Actions EMVCo to consider the use of EMV Scripts and EMV CPS in the mobile environment, in particular for post issuance and post distribution updating of the payment application and its counters and parameters; additionally, EMVCo to develop best practice guidelines and User Interface requirements for the management of post-distribution provisioning mechanisms, such as those offered by GlobalPlatform. Enhancements to the PPSE will also be considered as appropriate (also see section 4.2.2). Page 14 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 25. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 2.4.3 Payment Application and Credentials Deletion Description There needs to be a mechanism for deleting the payment credentials, and possibly even the payment application, from the mobile device after distribution. Such a deletion might be initiated by the user (“cutting up a credit card”), or it may be a revocation initiated by the account issuer. Another (tricky) scenario is a deletion at the request of the MNO e.g. due to discontinuation of the mobile service to the end-user or due to business disagreements between the MNO and account issuer. Deletion of the payment information is an important aspect in the lifecycle of a payment instrument. There needs to be mechanism for the account issuer to remotely revoke the payment credentials, and even delete the complete payment application, if needed. This “push deletion” could be invoked for a variety of reasons, including the mobile device being reported lost or stolen, or due to the payment history of the account holder. Whatever the reason, a mechanism for push deletion needs to be defined, to allow the payment instrument to be deleted by the account issuer as needed. However, the requirements for user interaction during a push deletion need to be considered. If the deletion is because the phone was lost or stolen, then requiring user interaction defeats this as a security measure. On the other hand, deletion without informing the user may also cause confusion, and so user notification after the event may be the best option. There may also be a desire to provide the user with a mechanism for removing their payment credentials from the mobile device if so desired. Such a mechanism would need to provide the user with the means to select the specific payment credentials that they want to delete, and to even delete the payment application in its entirety, if the user no longer wants to have access to the proximity payment functionality. On the other hand, providing the user with a mechanism to delete their payment credentials or application could result in accidental deletion, which could certainly lead to customer service issues. In order to get payment credentials restored which have been accidentally deleted, it may be unclear to the user whether they need to call their account issuer, or their mobile network operator. The level of visibility that a mobile operator has into what applications the user has on their device can vary on the model that is in use for allowing downloads. For example, some operators allow the user to download any application, while others allow it only through their portal. So support from the mobile network operator for reinstalling a deleted payment application may be limited. An alternative to allowing the user to delete their payment credentials is to provide the user with the necessary contact information to request the deletion of the credentials, and then to have the deletion initiated by the account issuer, or other responsible party. October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 15
  • 26. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 EMVCo Planned Actions EMVCo to consider best practices guidelines that the methods used to provision the payment application in a secure element also be able to remove the payment application. In the event that the secure element application environment does not allow for the deletion of the payment application, EMVCo to consider User Interface requirements and mechanisms to allow for the disablement of the payment application and the deletion of the payment credentials. EMVCo to consider developing requirements and collaborating with standards bodies such as GlobalPlatform to provide application deletion/disablement capabilities to the user, account issuer or possibly the MNO. 2.4.4 Device Change with Embedded Secure Element A device change could occur for a variety of reasons, including the user upgrading to a new mobile device, or replacing a device which has been lost or stolen. In some cases, this change could also include a change of mobile subscription, as detailed above. If the secure element is embedded in the mobile device, then such a change may require the entire personalisation process to be repeated for the new mobile device, including both the payment application, and the payment credentials issued to the device user. This would follow the personalisation process described above. Under ideal circumstances, any information related to the payment credentials will be deleted from a mobile device before any attempt is made to reinstall them on a replacement mobile device. This should be done according to the processes for deletion above. EMVCo Planned Actions EMVCo to consider a best practices guideline that the standard processes for deletion and provisioning and personalisation should be used to transfer the credentials from one mobile device secure element to another mobile device secure element. 2.4.5 Device Change with Removable Secure Element Description Mobile devices utilizing a removable secure element are also subject to routine replacement/upgrading, but because the secure element is removable, in some instances it can be transferred by the user to the new mobile device, assisting in the transition. Of course, if a device is lost, the situation would be similar to a device change with a non-removable secure element, e.g. loss of both the mobile device and the secure element. This section discusses the situation where the mobile device itself is being changed, and the secure element is being transferred to the new device. Page 16 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 27. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 The advantage of having a removable secure element is that a complete re- personalization of the mobile device may not be required when a device change is made. However, any time the secure element is transferred from one device to another, the compatibility of the new device will need to be verified. Compatibility includes not only physical and electrical compatibility of the removable element with the new phone, but also compatibility of the user interface application with the payment application. If the user interface application has been personalised or customized by the user2, then this personalisation or customisation may also need to be transferred. Device management, such as that defined by the Open Mobile Alliance, provides tools to enable a new device to replicate the set up of a previous device by means of data (for example, branding elements, user preferences etc.) stored on a device management server. EMVCo Planned Actions In order to enable interoperability between removable secure elements, EMVCo to consider the development of requirements of standardised commands from the user interface application and the payment application along with standard application labels which may be used to store customised information associated with the payment application. These requirements will also consider the security between the user interface application and payment application. EMVCo to consider development of requirements for management of customised elements on a mobile device and collaborate with standards bodies such as the Open Mobile Alliance to define appropriate device management mechanisms. 2.4.6 User Interface Application Provisioning The user interface application will need to be provisioned and possibly personalised on the mobile platform or the secure element3. As with the payment application, the user interface application may be provisioned either pre-distribution of the mobile device, or post-distribution. Standardisation of the API between the user interface application and the payment application would allow for greater flexibility in pre-distribution provisioning. Most mobile application environments provide standard methods of provisioning applications on the mobile platform. EMVCo Planned Actions EMVCo to consider defining the API between the user interface application and the payment application (see also section 2.4.5). 2This may include user defined names for accounts, priorities or preferences of accounts and so on. 3For example, if the user interface application makes use of USIM Application Toolkit, it would reside on the UICC. October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 17
  • 28. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Additionally, EMVCo to consider a best practices guideline that the standard methods of provisioning applications on the mobile platform should be used and/or enhanced for provisioning the user interface application. Page 18 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 29. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 3 Customer Care Customer care for mobile devices is most commonly handled by the MNO, who has the primary relationship with the mobile device user. Mobile manufacturers may also provide customer care for hardware issues. If payment is introduced on a mobile device, users may still associate customer care with the MNO, or may address concerns to the account issuer or payment association. In any case, it should be assumed that users will not always know the correct point of contact, nor understand whether the problem is a hardware or software problem, or an account related problem such as lack of funds. While relationships and agreements may be in place between issuers and MNOs to handle customer care, in general MNOs may not be aware of the payment accounts a user has installed on his or her device, and issuers may not be aware of the model and configuration of the user’s mobile device. The mobile contactless payment application should not prevent support for customer care enquires, such as providing identifiers to allow a user’s issuer and account to be identified, and also to provide information about the configuration of payment application and mobile device. EMVCo Planned Actions To assist with customer care interactions, EMVCo to consider defining standard application labels and/or application commands which may be used to assist in customer care. October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 19
  • 30. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 Page 20 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 31. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 4 Usability 4.1 Introduction Usability addresses concerns with the experience of the user who wants to use a mobile device for proximity payment. Many aspects of the proximity payment process, from provisioning and personalization of the mobile device to selecting the desired credentials for payment, to performing the payment transaction, have usability concerns associated with them. The goal in identifying these issues, and in making recommendations to address these issues, is to ensure ease-of-use, minimize confusion regarding device functionality, and to in general achieve a level of consistency in the proximity payment user experience that will help promote broad acceptance. 4.2 Transaction Experience Usability Issues Transaction experience issues are those issues which involve the user interaction with the mobile device when making a proximity payment. These include the process for selecting and managing payment credentials, and how the device will function when interacting with the POS terminal. 4.2.1 User Authentication / Cardholder Verification Description To prevent unauthorized use of a mobile device for proximity payment, it is expected that some type of authentication process will be optionally available for enabling the proximity payment functionality. This authentication may be for cardholder verification, or it may be to lock or unlock the payment application for use. Although it is likely that most users may not make extensive use of this lock/unlock process to secure their proximity payment credentials, just having it available will provide the user with peace of mind that their device can be secured. One likely solution for user authentication would be through the entry of a passcode set by the user, which would enable the payment application. Using a numeric passcode as the authentication mechanism to enable the proximity payment application is something that many users of today’s mobile devices would already be familiar with. Depending upon the requirements of the primary actors in the proximity payment transaction (account issuers, merchants, card associations, etc), authentication of the user could be required at different frequencies, including: • Rarely, to simply enable use of the payment application October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 21
  • 32. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 • Each time the user enables a particular set of payment credentials for making payments • On a transaction by transaction basis However, while this type of authentication process is certainly desirable, if it is too complex, or requires the user to authenticate themselves to their device too often, then it could be a disincentive for using the mobile device as a payment device. Also, the authentication process must utilize a secure entry method, and the secure element as needed, to ensure that the authentication information can not be recorded by another application running on the mobile device. STIP could be a good answer to secure the passcode entry and its transfer to the secure element. EMVCo Planned Actions EMVCo to consider user interface requirements and application commands that enable the locking and unlocking of a proximity payment application. These commands should provide for convenient and secure application usage management of multiple accounts contained on secure elements, including options for locking policies such as frequency of application locking and locking per application or for all applications. 4.2.2 Multiple payment applications on single device Description Many of the existing proximity payment systems have been designed around the payment credentials being stored on a dedicated device, such as contactless payment cards, key fobs or tags. These devices are supplied by the issuer, and hence the number of payment credentials on the device is constrained in a well defined manner. Typically there will only a single set of credentials, or possibly a very small number (for example, debit and credit), and these will be issued by a single issuer for a single payment association. Under these conditions, payment credential selection is performed by the user presenting a particular device to the reader. The POS may cycle through the payment brands which are accepted at the merchant until that available on the device is encountered. In the cases where multiple credentials exist, these will usually be selected on the POS device. This method of selection will not work in the case where multiple credentials exist on a single device. Conceptually, the mobile device now acts like a physical wallet in which multiple cards are stored. Bringing the mobile device into proximity with the POS terminal is analogous to putting a wallet in proximity and expecting the POS to correctly choose the correct card. Page 22 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 33. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 The mobile device needs to convey to the POS terminal information regarding which of the payment credentials has been selected. One method of achieving this is to present the available credentials, with an indication of the selection priority. This would assist where not all of the available payment credentials on the device are accepted by the merchant. The POS may select the highest priority credentials which are accepted. This however requires that the POS terminal currently expects the possibility of a multiplicity of credentials, and also that the method of selection between the different payment applications and brands is compatible. If protocols for exchange of the transaction credentials differ greatly between payment applications it may be that if the presence one payment application (or set of payment credentials) has been identified by the POS it will be impossible to select a different payment application (or payment credentials). In this case, the mobile device may need to implement a filter in order to only make the selected payment credentials visible to the POS terminal. EMVCo Planned Action The contactless payment application must have a mechanism to enable the POS to interact with the chosen payment application. It is expected that the PPSE mechanism defined by the EMV Contactless Working Group should provide this capability. This should include considerations of enhancing the PPSE as appropriate to support the mobile payment environment. EMVCo to consider defining commands for a user interface application to manage the PPSE appropriately in order to reflect the user selection of the payment instrument (see section 4.2.3 for more details). 4.2.3 Payment Credential Selection Process Description While the first mobile devices which are enabled for contactless payment will contain only a single set of payment credentials, in future implementations it is expected that each device will be able to hold multiple sets of payment credentials. These multi-credential implementations will require some mechanism for allowing the user to select which set of credentials to use for completing a specific transaction. This mechanism will likely involve the user interface application in conjunction with the PPSE to allow the user to choose which set of credentials is to be used, either on a transaction-by-transaction basis, or based on a preconfigured set of user preferences. If so desired, this sort of digital wallet application could possibly be enabled to perform a variety of automatic credential selection functions on behalf of the user, based on the amount of information available for each specific transaction, the types of payment credentials accepted by the merchant, and a set of predefined user preferences. For example, the user could set preferences such as: • Default set of credentials to be used • Priority order in which to use credentials for payment October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 23
  • 34. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 The behaviour of the POS terminals needs to be defined so that it respects this application selection mechanism, including in the case where the PPSE is not present or does not contain the expected data. EMVCo Planned Actions EMVCo to account for the following set of considerations in the development of User Interface requirements and best practices guidelines: • Any payment application supporting multiple payment credentials should provide the user with the ability to select the set of credentials to be used on a transaction-by-transaction basis. It would also be desirable to allow the user to select a default set of credentials to be used, unless an alternate set of credentials is selected for a particular transaction. • The interaction between the mobile device and the POS should not allow the merchant to override the user preferences and the behaviour of POS devices needs to be defined to respect the user preferences. • Malicious readers seeking to attack the payment application need not follow the behaviour specified for a POS terminal, so mechanisms to prevent the activation of non-selected applications should be explored. • It would also be useful if the payment application allows for the selection of a default set of credentials, to be used for any transaction in which the user has not chosen a specific set of credentials for completing that transaction. • The mechanism for selection of a particular account when multiple contactless payment applications are available should be specified, but not the user interface (beyond “guidelines” and recommendations from EMVCo). • The API which the mobile device must send to the contactless payment application for account selection should be standardised for interoperability between user interface applications and the payment application. 4.2.4 Payment Credential Availability with Device Off Description One key issue with using a mobile device as a proximity payment instrument is whether the payment functionality could be available even if the device is powered off, and whether or not operation should be allowed in this case. Technically, it is feasible to support proximity payment when the mobile device is not powered; the nature of the proximity modem technology is such that the POS device can provide the power necessary to enable a transaction to be completed. Whether or not such operation should be allowed, however, is a more contentious issue, with arguments being made both for and against doing so. Potential concerns and issues that have been identified regarding having the mobile device proximity payment capabilities operational when the device is not powered include: Page 24 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 35. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 • Since off-network lost or stolen device credentials can’t be deleted OTA, the user could have concerns that unauthorized transactions could be made, even if the liability is limited, which might cause them to avoid using the device as a payment instrument. This could be a valid concern for off-line POS transactions. • If the device is powered off, there would be no way for a user to designate that a specific set of payment credentials be used (in multi-credential systems); unless a default set of credentials has been previously selected for use, the device would not be usable as a payment instrument. • There may be account issuers who want more control over the management of credentials stored in a mobile device, who may argue against allowing credentials to be used unless the device is on-line, and some level of routine authentication is performed. • It would not be possible to immediately indicate to the user that a transaction has taken place (e.g. no sound or flashing lights), so the user would need to rely on only the indication from the POS device that the transaction was successful. • Any related branding opportunity that relied on the mobile device being powered up would be lost. • There may be risk issues if powering down the phone bypasses security settings (such as a lock code) that the user has selected. Arguments for having the proximity payment capabilities enabled even when the device is powered down include: • If the mobile device cannot be used if powered down, then users will not rely on it as a payment instrument; instead, they will rely on more traditional payment mechanisms, rather than having to worry about whether their mobile device will “work” if power is lost. • Other form factors used for proximity payment are passive, so the user’s expectation might be that the same should be possible with mobile devices. EMVCo Planned Actions There is not a hard requirement that proximity payment functionality must work when the device is powered off. However EMVCo to consider requirements for the mobile contactless payment application operating when the device is powered down. Such considerations include: • Having a default application selection method, possibly based on the power state of the mobile device; • Detection of power state and restricting functionality accordingly. October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 25
  • 36. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 4.3 Branding The brands associated with the issuer and payment scheme are an important element in deploying a mobile proximity payment solution. It is expected that branding will primarily be through the user interface, rather than physical branding on the mobile device or secure element. 4.3.1 Branding via the User Interface Description Service providers (banks, petrol stations, etc.) have two possible opportunities to dialog with the user and display their brands: • During the operation of the application (e.g. loading of tickets, reloading of the e-purse, checking of the loyalty points left). • During the contactless transaction itself. Some action by the user may be needed, depending on the application (selecting a payment instrument, enter PIN code). At the end of the transaction, a brand could be displayed to the user via the UI. There could also be different branding requirements from different service providers. For example, branding could be visual and/or audio. Depending on the technology used for the UI, it may or may not be possible to display a brand. For example, the USIM Toolkit is very limited, and might not support the display of a brand, whereas a browsing solution or Java solution provides better ergonomic ability for branding. EMVCo Planned Actions EMVCo to consider how the mobile contactless payment application should provide a mechanism to the mobile device to indicate when branding should be displayed, and what branding should be displayed. This may include flags to indicate the success of the transfer of information from the mobile device to the POS terminal and standard elements to identify which branding element should be displayed. Page 26 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. October 2007
  • 37. EMV Mobile Contactless Payment Technical Issues and Position Paper Version 1.0 <<< END OF DOCUMENT >>> October 2007 © 2007 EMVCo, LLC (“EMVCo”). All rights reserved. Page 27