SlideShare a Scribd company logo
CAN SECURITY AND
CONVENIENCE GO HAND IN
HAND IN E-COMMERCE?
Aljoša Lovrič-Petrič, Head of Innovation and Prototyping
Ladislav Grgac, Issuing Expert
Ljubljana, May 2017
3D SECURE 2.0
3D SECURE 2.0
New EMVCo 3D secure specification
● Released in October 2016
● Supported by payment schemes (Visa, MasterCard, Amex and others)
Main goals
● Increase security and decrease friction in payment flow
● Balance between security and UX
● Consistent UX on the app-based and web-based interfaces (HTML and native apps)
New non-payment use cases
● Strong authentication uses (ID&V)
RBA (Risk Based Authentication)
● Evaluates also and customer‘s transaction and account history on the merchant side
● High risk authentications – customers needs to authenticate
● Low risk authentications – no additional input required (frictionless)
3
CONFIDENTIAL
NEW TERMINOLOGY
v1.0 v2.0
Merchant 3DS requestor
Merchant plug-in (MPI) 3DS server
n/a 3DS requestor environment
Merchant integrator 3DS integrator
n/a 3DS requestor app
4
CONFIDENTIAL
PROCESS FLOW
Directory Server
Access Control
Server
$
Issuer
$
Acquirer
Payment
Network
Challenge
Request / Response
3DS Requestor /3DS Server APIs
Payment
Request
Authorization
Message
Authorization
Message
Result
Request /
Response
Authentication
Request /
Response
Result
Request /
Response
Authentication
Request /
Response
3DS Requestor Environment
Merchant 3DS Server3DS customer
5
CONFIDENTIAL
ACS 2.0
• First possible issuer rollouts in Q2 2018
(MasterCard, Visa and Amex)
• 3D Secure v1.0 to be supported until
schemes decision to sunset it
• Both versions to be maintained in
parallel due to backward
incompatibility
• Authentication methods supported on both
versions:
• SMS OTP
• mToken as standalone app or SDK for
integration with another app (e.g.
Mobile banking)
• CAP/DPA (on ACS 1.0)
• Different data models:
• ACS v1.0 – 10 data elements in the
process
• ACS v2.0 – 60+ elements including
purchase behavior from e-shop
• Different data format (from XML to Json)
• Introduced Risk Based Authentication (Issuer
strategy dependent)
• Pushed by Schemes (Visa proposes
that 80% of transactions shall be
approved by RBA)
• Enhanced user experience – light box vs.
redirection
Overview Roadmap
6
CONFIDENTIAL
RISK BASED AUTHENTICATION
Source: Visa Inc.
7
CONFIDENTIAL
STRONG
AUTHENTICATION
Strong authentication is a procedure based on the use of two
or more of the following elements:
• Something only the user knows (e.g. static password, code,
PIN…)
• Something only the user have (e.g. mobile device, smart card,
token…)
• Something the user is (e.g. biometric characteristic, fingerprint)
Why strong authentication?
• The interests of all participants in an authentication process
(users, banks, processors, regulators) to ensure the highest level
of security of access and use of sensitive data.
• Trends in cloud services and enabling secure access to it
• European Banking Authority (EBA) Guidelines on the security of
internet payments ECB Recommendations for the security of
internet payments…
STRONG AUTHENTICATION
The elements selected must be
mutually independent, i.e. the breach
of one does not compromise the
other(s).
At least one of the elements should
be non-reusable, non-replicable and
not capable of being stolen via
Internet.
The SA procedure should be designed
in such a way as to protect the
confidentiality of the authentication
data.
9
CONFIDENTIAL
HOW IT WORKS…
During checkout process a transaction using
MasterCard SecureCode or Verified by Visa will
initiate a redirection to the website of the card issuing
bank to authenticate the customer and authorize the
transaction.
Issuer could use any kind of supported authentication
method.
10
CONFIDENTIAL
SOLUTIONS DESCRIPTION
CARD READER
• Hardware based solution
• Requires EMV smart
card with preloaded CAP
or DPA application
• Supports several
authentication methods:
• User Identification
• Challenge/Respon
se
• Transaction Data
Signature
MOBILE TOKEN
• Software based solution
requiring mobile device
• Uses a cryptographic key
for user authentication
• Provides a high level of
security protection including
protection from a Man-in-
the-middle attack
• Use of standard
authentication algorithms
(Time based OTP,
Challenge / Response, QR
code scan)
SMS OTP
• Generated and verified
via HSM
• OTPs not stored in
database
• Service integration with
SMS gateway (bank,
PSP, etc.)
11
CONFIDENTIAL
AUTHENTICATION WORKFLOWS
Card reader
OTP SMS
mToken
12
CONFIDENTIAL
TOKENIZATION
TOKENIZATION
• Process of substituting a sensitive data element with a non-sensitive equivalent that has no exploitable value
• Significantly increases security and reduces fraud, especially in non-face to face transactions like e-commerce
and MO/TO
• Applicable for payment products enrolled into mobile wallet
• Provided by certified Token Service Provider
• Payment schemes
– MasterCard Digital Enablement Service
– Visa Token Service
• 3rd party providers (PSP, Issuers, etc.)
– following EMVCo technical specification
– certified by respective payment schemes
• PAN tokens are not derived from payment card BIN range
• Under token BINs or BIN subranges no physical cards are issued
14
CONFIDENTIAL
► Incurs additional costs as tokenization process makes
on-us authorization unrecognizable so all
authorizations go through payment scheme’s network
► Currently the only available solution for Visa products
► Avoiding additional costs charged by Payment schemes
by keeping on-us authorizations
► Decreasing future risks if payment scheme introduces
tokenization specific costs
TSP OPTIONS
3PP EMVCo token service VTS / MDES
Bank host
PSP host
Customer
De-tokenization
Token vault PS host
Payment
network
POSPAN token cardMobile wallet
Real PAN card
PSP host
Customer
Bank host
Token vaultDe-tokenization
POSMobile wallet PAN token card
Real PAN card
15
CONFIDENTIAL
VIRTUAL
E-COMM CARDS
VIRTUAL E-COMMERCE CARD
Product based service in mobile banking /
wallet offering cardholders fast, convenient and
secure online shopping experience.
• Generated via mobile wallet / Internet banking
• Enabled only for e-commerce purchase
• No renewal policy
• Uses tokenized PANs from separate BIN range
• Only one virtual card of the same type allowed
per product
• May be manually cancelled by the cardholder
or automatically invalidated either by reaching
the spending limit or maximum allowed number
of transactions or by expiry of its validity period
Single use Multi use
Spending limit
Trx. count limit
Limited validity
Card types
Management
Cardholder setup spending limit (for both card types) and
number of transactions (for multiple use virtual cards only)
within maximum allowed values set by the issuer
1
17
CONFIDENTIAL
GEO-CONTROL
GEO-CONTROL
• Profile without any restrictions
• Auto-activated if transaction triggers fraud
alert
• Overrides other profiles
• Cannot be selected by the cardholder
Limited
• May enabled per entire BIN or per
individual PAN
• Duration may be setup as temporary (date-
based)
• Restriction parameters defined by the
Issuer:
• Country
• Transaction type
• MCC
• Rejected transaction reason codes
exposed for complaint management
Manual
Profile switching
Auto
• By customer (via wallet app
or m-banking channels)
• By call center agent
• Upon expiration of date-
based restrictions
• By fraud monitoring system
Switching to fraud specific profile creates an
SMS to a cardholder
• SMS remains in pending status until
event analysis is completed
• Fraud specialist can trigger manual send
of pending SMS if necessary
Profile based service designed to enable customers to
effectively manage risks associated with card transactions
via mobile channel
Worldwide
Fraud
19
CONFIDENTIAL
MASTERPASS
ACCEPTANCE
• At online merchants, wherever
Masterpass button is displayed
• Masterpass accepts credit, debit,
or prepaid cards from MasterCard,
Maestro, American Express, Diners
Club, Discover, VISA, China
UnionPay and Private Label cards
• All currencies are supported
AVAILABILITY
• Currently available in 60 countries
globally (28 in Europe)
• Works on the mobile and web
browsers
DIGITAL WALLET SERVICE
• Makes online shopping safe and
secure, easy, fast and convenient
• It stores customers’ payment cards
details, including shipping details
and loyalty cards
• No need to enter long card details
every time customers check out
DESCRIPTION & BENEFITS
CONVENIENCE
works with many
OS’es (desktop
and mobile)
SIMPLICITY
eliminates need to
enter payment and
shipping information
for every purchase
TRUST
critical card details
are not stored by
the merchant
SPEED
fast, one
click checkout
SECURITY
card details are
stored in the bank
(or with PSP)
21
CONFIDENTIAL
HIGH LEVEL VIEW
22
CONFIDENTIAL
CHECKOUT OPTIONS
StandardExpressConnected
23
CONFIDENTIAL
www.mercury-processing.com
+386 5 666 1312
aljosa.lovric-petric@mercury-processing.com
Aljoša Lovrič-Petrič
Head of Innovation and Prototyping
IT and Innovation Division
CONTACT
Ladislav Grgac
Issuing Expert
Business Management Division
+385 1 6456 504
www.mercury-processing.com
ladislav.grgac@marcury-processing.com
24
THANK YOU!
Any questions?

More Related Content

What's hot

Securing Online Card Transactions
Securing Online Card TransactionsSecuring Online Card Transactions
Securing Online Card Transactions
Shaillender (Bob) Mittal, CPSP
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
Suraj Dhalwar
 
Loyalty
LoyaltyLoyalty
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Netcetera
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
ZTech Proje
 
Safex pay wl-pg-presentation
Safex pay wl-pg-presentationSafex pay wl-pg-presentation
Safex pay wl-pg-presentation
Neha Sahay
 
Introducing safex pay 2018
Introducing safex pay 2018Introducing safex pay 2018
Introducing safex pay 2018
Neha Sahay
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
Kartik Kalpande Patil
 
E transaction
E transactionE transaction
E transaction
Zeeshan Ahmed
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
Ivona M
 
Seamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceSeamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experience
Netcetera
 
Digital Payments - Netcetera Innovation Summit 2018
Digital Payments - Netcetera Innovation Summit 2018Digital Payments - Netcetera Innovation Summit 2018
Digital Payments - Netcetera Innovation Summit 2018
Netcetera
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraud
Henley Walls
 
Safex pay avantgarde -presentation
Safex pay avantgarde -presentationSafex pay avantgarde -presentation
Safex pay avantgarde -presentation
ParvezKhan173
 
Mobile payment solution
Mobile payment solutionMobile payment solution
Mobile payment solution
hearme limited company
 
Powerful Reward Platform
Powerful Reward PlatformPowerful Reward Platform
Powerful Reward Platform
Mikhail Miroshnichenko
 
Merchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote CommerceMerchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote Commerce
Netcetera
 
Cardless and contactless transactions
Cardless and contactless transactionsCardless and contactless transactions
Cardless and contactless transactions
Michal Voldrich, MBA
 
Cardless ATMs - European ATMs 2015 conference in London
Cardless ATMs - European ATMs 2015 conference in LondonCardless ATMs - European ATMs 2015 conference in London
Cardless ATMs - European ATMs 2015 conference in London
Michal Voldrich, MBA
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
TransUnion
 

What's hot (20)

Securing Online Card Transactions
Securing Online Card TransactionsSecuring Online Card Transactions
Securing Online Card Transactions
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
 
Loyalty
LoyaltyLoyalty
Loyalty
 
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...
 
Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...Psdot 16 a new framework for credit card transactions involving mutual authen...
Psdot 16 a new framework for credit card transactions involving mutual authen...
 
Safex pay wl-pg-presentation
Safex pay wl-pg-presentationSafex pay wl-pg-presentation
Safex pay wl-pg-presentation
 
Introducing safex pay 2018
Introducing safex pay 2018Introducing safex pay 2018
Introducing safex pay 2018
 
Digital signature and adv payment gateway
Digital signature and adv payment gatewayDigital signature and adv payment gateway
Digital signature and adv payment gateway
 
E transaction
E transactionE transaction
E transaction
 
3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar3D-Secure 2.2 Webinar
3D-Secure 2.2 Webinar
 
Seamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceSeamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experience
 
Digital Payments - Netcetera Innovation Summit 2018
Digital Payments - Netcetera Innovation Summit 2018Digital Payments - Netcetera Innovation Summit 2018
Digital Payments - Netcetera Innovation Summit 2018
 
How to identify credit card fraud
How to identify credit card fraudHow to identify credit card fraud
How to identify credit card fraud
 
Safex pay avantgarde -presentation
Safex pay avantgarde -presentationSafex pay avantgarde -presentation
Safex pay avantgarde -presentation
 
Mobile payment solution
Mobile payment solutionMobile payment solution
Mobile payment solution
 
Powerful Reward Platform
Powerful Reward PlatformPowerful Reward Platform
Powerful Reward Platform
 
Merchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote CommerceMerchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote Commerce
 
Cardless and contactless transactions
Cardless and contactless transactionsCardless and contactless transactions
Cardless and contactless transactions
 
Cardless ATMs - European ATMs 2015 conference in London
Cardless ATMs - European ATMs 2015 conference in LondonCardless ATMs - European ATMs 2015 conference in London
Cardless ATMs - European ATMs 2015 conference in London
 
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account SecurityNice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
Nice Try, ATO: Use Customers’ Devices to Transparently Enhance Account Security
 

Similar to Can security and convenience go hand in hand in e-commerce

Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Danail Yotov
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
ShujaShah
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
Subhash Gupta
 
E commerce
E commerceE commerce
E commerce
Himadri Shekhar
 
Bankcore ID
Bankcore IDBankcore ID
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
Ivona M
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
Vesta Corporation
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Goutama Bachtiar
 
Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIT
hiteshasnani94
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
Narudom Roongsiriwong, CISSP
 
Industry Session on Banking & Financial Services
Industry Session on Banking & Financial ServicesIndustry Session on Banking & Financial Services
Industry Session on Banking & Financial Services
Tata Consultancy Services
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
Killian Delaney
 
PayNet Mobile Banking Introduction 2017
PayNet Mobile Banking Introduction 2017PayNet Mobile Banking Introduction 2017
PayNet Mobile Banking Introduction 2017
Tushar Belwal
 
Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bank
Steve Sidner
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
TransUnion
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
Dilip Kumar
 
Session 2.4 - Integrated Transport
Session 2.4 - Integrated TransportSession 2.4 - Integrated Transport
Session 2.4 - Integrated Transport
WRI Ross Center for Sustainable Cities
 
EMV Credit Card Technology in Parking
EMV Credit Card Technology in ParkingEMV Credit Card Technology in Parking
EMV Credit Card Technology in Parking
Parking & Traffic Consultants
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online bankingAbhilash Kallayil
 
NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]Khaled Hasan
 

Similar to Can security and convenience go hand in hand in e-commerce (20)

Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
E commerce
E commerceE commerce
E commerce
 
Bankcore ID
Bankcore IDBankcore ID
Bankcore ID
 
Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?Security & Seamless CX in User Authentication: How to Achieve Both?
Security & Seamless CX in User Authentication: How to Achieve Both?
 
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
How the UK's #1 Mobile Network Enhanced Its Approval Rate by 10%, with Zero F...
 
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIT
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
Industry Session on Banking & Financial Services
Industry Session on Banking & Financial ServicesIndustry Session on Banking & Financial Services
Industry Session on Banking & Financial Services
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
PayNet Mobile Banking Introduction 2017
PayNet Mobile Banking Introduction 2017PayNet Mobile Banking Introduction 2017
PayNet Mobile Banking Introduction 2017
 
Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bank
 
PSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in EuropePSD2: The Advent of the New Payments Market in Europe
PSD2: The Advent of the New Payments Market in Europe
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
 
Session 2.4 - Integrated Transport
Session 2.4 - Integrated TransportSession 2.4 - Integrated Transport
Session 2.4 - Integrated Transport
 
EMV Credit Card Technology in Parking
EMV Credit Card Technology in ParkingEMV Credit Card Technology in Parking
EMV Credit Card Technology in Parking
 
Industrial application on online banking
Industrial application on online bankingIndustrial application on online banking
Industrial application on online banking
 
NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]NFC Presentation [Compatibility Mode]
NFC Presentation [Compatibility Mode]
 

More from Mercury Processing Services International

The first certified VISA processor aggregator in Europe
The first certified VISA processor aggregator in EuropeThe first certified VISA processor aggregator in Europe
The first certified VISA processor aggregator in Europe
Mercury Processing Services International
 
Cultural transformation in I&O
Cultural transformation in I&OCultural transformation in I&O
Cultural transformation in I&O
Mercury Processing Services International
 
Securing complex systems using centralized tokenization service
Securing complex systems using centralized tokenization serviceSecuring complex systems using centralized tokenization service
Securing complex systems using centralized tokenization service
Mercury Processing Services International
 
The First Certified Visa Processor Aggregator In Europe
The First Certified Visa Processor Aggregator In EuropeThe First Certified Visa Processor Aggregator In Europe
The First Certified Visa Processor Aggregator In Europe
Mercury Processing Services International
 
PSD 2 - Ocean of requirements
PSD 2 - Ocean of requirementsPSD 2 - Ocean of requirements
PSD 2 - Ocean of requirements
Mercury Processing Services International
 
Machine learning as an enhancement for scoring models
Machine learning as an enhancement for scoring modelsMachine learning as an enhancement for scoring models
Machine learning as an enhancement for scoring models
Mercury Processing Services International
 
Issuing fraud trends in Slovenia
Issuing fraud trends in SloveniaIssuing fraud trends in Slovenia
Issuing fraud trends in Slovenia
Mercury Processing Services International
 
Upcoming payment schemes rules changes
Upcoming payment schemes rules changesUpcoming payment schemes rules changes
Upcoming payment schemes rules changes
Mercury Processing Services International
 
Fighting fraud with artificial inteligence
Fighting fraud with artificial inteligenceFighting fraud with artificial inteligence
Fighting fraud with artificial inteligence
Mercury Processing Services International
 
What are the most recent Lynx Fraud Management System upgrades
What are the most recent Lynx Fraud Management System upgradesWhat are the most recent Lynx Fraud Management System upgrades
What are the most recent Lynx Fraud Management System upgrades
Mercury Processing Services International
 
Better fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergyBetter fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergy
Mercury Processing Services International
 
Our way of fighting fraud
Our way of fighting fraudOur way of fighting fraud
How to talk business on IDC Adriatic Security Summit 2018
How to talk business on IDC Adriatic Security Summit 2018How to talk business on IDC Adriatic Security Summit 2018
How to talk business on IDC Adriatic Security Summit 2018
Mercury Processing Services International
 

More from Mercury Processing Services International (13)

The first certified VISA processor aggregator in Europe
The first certified VISA processor aggregator in EuropeThe first certified VISA processor aggregator in Europe
The first certified VISA processor aggregator in Europe
 
Cultural transformation in I&O
Cultural transformation in I&OCultural transformation in I&O
Cultural transformation in I&O
 
Securing complex systems using centralized tokenization service
Securing complex systems using centralized tokenization serviceSecuring complex systems using centralized tokenization service
Securing complex systems using centralized tokenization service
 
The First Certified Visa Processor Aggregator In Europe
The First Certified Visa Processor Aggregator In EuropeThe First Certified Visa Processor Aggregator In Europe
The First Certified Visa Processor Aggregator In Europe
 
PSD 2 - Ocean of requirements
PSD 2 - Ocean of requirementsPSD 2 - Ocean of requirements
PSD 2 - Ocean of requirements
 
Machine learning as an enhancement for scoring models
Machine learning as an enhancement for scoring modelsMachine learning as an enhancement for scoring models
Machine learning as an enhancement for scoring models
 
Issuing fraud trends in Slovenia
Issuing fraud trends in SloveniaIssuing fraud trends in Slovenia
Issuing fraud trends in Slovenia
 
Upcoming payment schemes rules changes
Upcoming payment schemes rules changesUpcoming payment schemes rules changes
Upcoming payment schemes rules changes
 
Fighting fraud with artificial inteligence
Fighting fraud with artificial inteligenceFighting fraud with artificial inteligence
Fighting fraud with artificial inteligence
 
What are the most recent Lynx Fraud Management System upgrades
What are the most recent Lynx Fraud Management System upgradesWhat are the most recent Lynx Fraud Management System upgrades
What are the most recent Lynx Fraud Management System upgrades
 
Better fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergyBetter fraud solution through fraud and IT synergy
Better fraud solution through fraud and IT synergy
 
Our way of fighting fraud
Our way of fighting fraudOur way of fighting fraud
Our way of fighting fraud
 
How to talk business on IDC Adriatic Security Summit 2018
How to talk business on IDC Adriatic Security Summit 2018How to talk business on IDC Adriatic Security Summit 2018
How to talk business on IDC Adriatic Security Summit 2018
 

Recently uploaded

Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Lviv Startup Club
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
marketing317746
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
Norma Mushkat Gaffin
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
WilliamRodrigues148
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
RajPriye
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
Cynthia Clay
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
tjcomstrang
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
LuanWise
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
zoyaansari11365
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
agatadrynko
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
LR1709MUSIC
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
sarahvanessa51503
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdfBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
daothibichhang1
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
usawebmarket
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
narasimhamurthyh4
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
Lviv Startup Club
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Navpack & Print
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
KaiNexus
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
Corey Perlman, Social Media Speaker and Consultant
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
Ben Wann
 

Recently uploaded (20)

Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
Evgen Osmak: Methods of key project parameters estimation: from the shaman-in...
 
amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05amptalk_RecruitingDeck_english_2024.06.05
amptalk_RecruitingDeck_english_2024.06.05
 
Mastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnapMastering B2B Payments Webinar from BlueSnap
Mastering B2B Payments Webinar from BlueSnap
 
Training my puppy and implementation in this story
Training my puppy and implementation in this storyTraining my puppy and implementation in this story
Training my puppy and implementation in this story
 
Project File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdfProject File Report BBA 6th semester.pdf
Project File Report BBA 6th semester.pdf
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf20240425_ TJ Communications Credentials_compressed.pdf
20240425_ TJ Communications Credentials_compressed.pdf
 
Recruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media MasterclassRecruiting in the Digital Age: A Social Media Masterclass
Recruiting in the Digital Age: A Social Media Masterclass
 
Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111Introduction to Amazon company 111111111111
Introduction to Amazon company 111111111111
 
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdfikea_woodgreen_petscharity_cat-alogue_digital.pdf
ikea_woodgreen_petscharity_cat-alogue_digital.pdf
 
FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134FINAL PRESENTATION.pptx12143241324134134
FINAL PRESENTATION.pptx12143241324134134
 
Brand Analysis for an artist named Struan
Brand Analysis for an artist named StruanBrand Analysis for an artist named Struan
Brand Analysis for an artist named Struan
 
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdfBài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
Bài tập - Tiếng anh 11 Global Success UNIT 1 - Bản HS.doc.pdf
 
Buy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star ReviewsBuy Verified PayPal Account | Buy Google 5 Star Reviews
Buy Verified PayPal Account | Buy Google 5 Star Reviews
 
Auditing study material for b.com final year students
Auditing study material for b.com final year  studentsAuditing study material for b.com final year  students
Auditing study material for b.com final year students
 
Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...Kseniya Leshchenko: Shared development support service model as the way to ma...
Kseniya Leshchenko: Shared development support service model as the way to ma...
 
Affordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n PrintAffordable Stationery Printing Services in Jaipur | Navpack n Print
Affordable Stationery Printing Services in Jaipur | Navpack n Print
 
Enterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdfEnterprise Excellence is Inclusive Excellence.pdf
Enterprise Excellence is Inclusive Excellence.pdf
 
Authentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto RicoAuthentically Social by Corey Perlman - EO Puerto Rico
Authentically Social by Corey Perlman - EO Puerto Rico
 
Business Valuation Principles for Entrepreneurs
Business Valuation Principles for EntrepreneursBusiness Valuation Principles for Entrepreneurs
Business Valuation Principles for Entrepreneurs
 

Can security and convenience go hand in hand in e-commerce

  • 1. CAN SECURITY AND CONVENIENCE GO HAND IN HAND IN E-COMMERCE? Aljoša Lovrič-Petrič, Head of Innovation and Prototyping Ladislav Grgac, Issuing Expert Ljubljana, May 2017
  • 3. 3D SECURE 2.0 New EMVCo 3D secure specification ● Released in October 2016 ● Supported by payment schemes (Visa, MasterCard, Amex and others) Main goals ● Increase security and decrease friction in payment flow ● Balance between security and UX ● Consistent UX on the app-based and web-based interfaces (HTML and native apps) New non-payment use cases ● Strong authentication uses (ID&V) RBA (Risk Based Authentication) ● Evaluates also and customer‘s transaction and account history on the merchant side ● High risk authentications – customers needs to authenticate ● Low risk authentications – no additional input required (frictionless) 3 CONFIDENTIAL
  • 4. NEW TERMINOLOGY v1.0 v2.0 Merchant 3DS requestor Merchant plug-in (MPI) 3DS server n/a 3DS requestor environment Merchant integrator 3DS integrator n/a 3DS requestor app 4 CONFIDENTIAL
  • 5. PROCESS FLOW Directory Server Access Control Server $ Issuer $ Acquirer Payment Network Challenge Request / Response 3DS Requestor /3DS Server APIs Payment Request Authorization Message Authorization Message Result Request / Response Authentication Request / Response Result Request / Response Authentication Request / Response 3DS Requestor Environment Merchant 3DS Server3DS customer 5 CONFIDENTIAL
  • 6. ACS 2.0 • First possible issuer rollouts in Q2 2018 (MasterCard, Visa and Amex) • 3D Secure v1.0 to be supported until schemes decision to sunset it • Both versions to be maintained in parallel due to backward incompatibility • Authentication methods supported on both versions: • SMS OTP • mToken as standalone app or SDK for integration with another app (e.g. Mobile banking) • CAP/DPA (on ACS 1.0) • Different data models: • ACS v1.0 – 10 data elements in the process • ACS v2.0 – 60+ elements including purchase behavior from e-shop • Different data format (from XML to Json) • Introduced Risk Based Authentication (Issuer strategy dependent) • Pushed by Schemes (Visa proposes that 80% of transactions shall be approved by RBA) • Enhanced user experience – light box vs. redirection Overview Roadmap 6 CONFIDENTIAL
  • 7. RISK BASED AUTHENTICATION Source: Visa Inc. 7 CONFIDENTIAL
  • 9. Strong authentication is a procedure based on the use of two or more of the following elements: • Something only the user knows (e.g. static password, code, PIN…) • Something only the user have (e.g. mobile device, smart card, token…) • Something the user is (e.g. biometric characteristic, fingerprint) Why strong authentication? • The interests of all participants in an authentication process (users, banks, processors, regulators) to ensure the highest level of security of access and use of sensitive data. • Trends in cloud services and enabling secure access to it • European Banking Authority (EBA) Guidelines on the security of internet payments ECB Recommendations for the security of internet payments… STRONG AUTHENTICATION The elements selected must be mutually independent, i.e. the breach of one does not compromise the other(s). At least one of the elements should be non-reusable, non-replicable and not capable of being stolen via Internet. The SA procedure should be designed in such a way as to protect the confidentiality of the authentication data. 9 CONFIDENTIAL
  • 10. HOW IT WORKS… During checkout process a transaction using MasterCard SecureCode or Verified by Visa will initiate a redirection to the website of the card issuing bank to authenticate the customer and authorize the transaction. Issuer could use any kind of supported authentication method. 10 CONFIDENTIAL
  • 11. SOLUTIONS DESCRIPTION CARD READER • Hardware based solution • Requires EMV smart card with preloaded CAP or DPA application • Supports several authentication methods: • User Identification • Challenge/Respon se • Transaction Data Signature MOBILE TOKEN • Software based solution requiring mobile device • Uses a cryptographic key for user authentication • Provides a high level of security protection including protection from a Man-in- the-middle attack • Use of standard authentication algorithms (Time based OTP, Challenge / Response, QR code scan) SMS OTP • Generated and verified via HSM • OTPs not stored in database • Service integration with SMS gateway (bank, PSP, etc.) 11 CONFIDENTIAL
  • 12. AUTHENTICATION WORKFLOWS Card reader OTP SMS mToken 12 CONFIDENTIAL
  • 14. TOKENIZATION • Process of substituting a sensitive data element with a non-sensitive equivalent that has no exploitable value • Significantly increases security and reduces fraud, especially in non-face to face transactions like e-commerce and MO/TO • Applicable for payment products enrolled into mobile wallet • Provided by certified Token Service Provider • Payment schemes – MasterCard Digital Enablement Service – Visa Token Service • 3rd party providers (PSP, Issuers, etc.) – following EMVCo technical specification – certified by respective payment schemes • PAN tokens are not derived from payment card BIN range • Under token BINs or BIN subranges no physical cards are issued 14 CONFIDENTIAL
  • 15. ► Incurs additional costs as tokenization process makes on-us authorization unrecognizable so all authorizations go through payment scheme’s network ► Currently the only available solution for Visa products ► Avoiding additional costs charged by Payment schemes by keeping on-us authorizations ► Decreasing future risks if payment scheme introduces tokenization specific costs TSP OPTIONS 3PP EMVCo token service VTS / MDES Bank host PSP host Customer De-tokenization Token vault PS host Payment network POSPAN token cardMobile wallet Real PAN card PSP host Customer Bank host Token vaultDe-tokenization POSMobile wallet PAN token card Real PAN card 15 CONFIDENTIAL
  • 17. VIRTUAL E-COMMERCE CARD Product based service in mobile banking / wallet offering cardholders fast, convenient and secure online shopping experience. • Generated via mobile wallet / Internet banking • Enabled only for e-commerce purchase • No renewal policy • Uses tokenized PANs from separate BIN range • Only one virtual card of the same type allowed per product • May be manually cancelled by the cardholder or automatically invalidated either by reaching the spending limit or maximum allowed number of transactions or by expiry of its validity period Single use Multi use Spending limit Trx. count limit Limited validity Card types Management Cardholder setup spending limit (for both card types) and number of transactions (for multiple use virtual cards only) within maximum allowed values set by the issuer 1 17 CONFIDENTIAL
  • 19. GEO-CONTROL • Profile without any restrictions • Auto-activated if transaction triggers fraud alert • Overrides other profiles • Cannot be selected by the cardholder Limited • May enabled per entire BIN or per individual PAN • Duration may be setup as temporary (date- based) • Restriction parameters defined by the Issuer: • Country • Transaction type • MCC • Rejected transaction reason codes exposed for complaint management Manual Profile switching Auto • By customer (via wallet app or m-banking channels) • By call center agent • Upon expiration of date- based restrictions • By fraud monitoring system Switching to fraud specific profile creates an SMS to a cardholder • SMS remains in pending status until event analysis is completed • Fraud specialist can trigger manual send of pending SMS if necessary Profile based service designed to enable customers to effectively manage risks associated with card transactions via mobile channel Worldwide Fraud 19 CONFIDENTIAL
  • 21. ACCEPTANCE • At online merchants, wherever Masterpass button is displayed • Masterpass accepts credit, debit, or prepaid cards from MasterCard, Maestro, American Express, Diners Club, Discover, VISA, China UnionPay and Private Label cards • All currencies are supported AVAILABILITY • Currently available in 60 countries globally (28 in Europe) • Works on the mobile and web browsers DIGITAL WALLET SERVICE • Makes online shopping safe and secure, easy, fast and convenient • It stores customers’ payment cards details, including shipping details and loyalty cards • No need to enter long card details every time customers check out DESCRIPTION & BENEFITS CONVENIENCE works with many OS’es (desktop and mobile) SIMPLICITY eliminates need to enter payment and shipping information for every purchase TRUST critical card details are not stored by the merchant SPEED fast, one click checkout SECURITY card details are stored in the bank (or with PSP) 21 CONFIDENTIAL
  • 24. www.mercury-processing.com +386 5 666 1312 aljosa.lovric-petric@mercury-processing.com Aljoša Lovrič-Petrič Head of Innovation and Prototyping IT and Innovation Division CONTACT Ladislav Grgac Issuing Expert Business Management Division +385 1 6456 504 www.mercury-processing.com ladislav.grgac@marcury-processing.com 24