SlideShare a Scribd company logo
EMV Transaction Flow
Contents
 Introduction to EMV
 Traditional MSR Vs EMV Transaction flow
 Online Data Authentication
 Offline Data Authentication
 EMV Migration
 Security in E-Commerce
Introduction to EMV
 EMV is a technical standard that defines interaction at the physical and electrical
data authentication levels between IC cards and their processing devices for
financial transactions .
 EMV stands for EuroPay, MasterCard, and Visa, the three companies which originally
created the standard.
 The standard is now managed by EMVCo, a consortium with control split equally
among Visa, Mastercard, JCB, American Express, China Union Pay, and Discover.
 EMV cards are also called as IC credit Chip and PIN Cards.
 EMV cards were introduced to improve security (Fraud Reduction) and for finer
control of "offline" credit-card transaction approvals.
 One of the original goals of EMV was to allow for multiple applications to be held on
a card: for a credit and debit card application or an e-purse.
MSR Vs EMV Transaction Flow
EMV Transaction Flow
EMV Transaction Flow
Application Selection:
 EMV chip is loaded with a application version number and the Application
Identification Numbers(AID’s) that the issuer supports.
 Based on the AID selected a particular Application in the terminal is selected
through which routing to the Issuer bank do happen.
 The PDOL (Processing Data Object Lists) is provided by the card to the terminal
during application selection.
Terminal Action Analysis
 Terminal risk management is done in the terminal to decide whether or not to go
online, checks the transaction amount against an offline ceiling limit.
 For online authorization transactions CDOL1 (Card Data object List),a list of tags
that the card wants to be sent to it to make a decision on whether to approve or
decline a transaction.
 Terminal sends this data and requests a cryptogram using the generate application
cryptogram command usually called 1st Gen AC
 Depending on the terminal′s decision (offline, online, decline), the terminal
requests one of the following cryptograms from the card:
 Transaction certificate (TC)—Offline approval
 Authorization Request Cryptogram (ARQC)—Online authorization
 Application Authentication Cryptogram (AAC)—Offline decline.
 The issuer responds to an authorization request with a response code (accepting or
declining the transaction), an authorization response cryptogram (ARPC) and
optionally an issuer script (a string of commands to be sent to the card).
EMV Chip Data
The data that is present in a chip card and few tags are sent to the issuer for
authorization
Cardholder verification
 Cardholder verification is used to evaluate whether the person presenting the card is the
legitimate cardholder. There are many cardholder verification methods (CVMs)
supported in EMV. They are:
 Signature.
 Offline plaintext PIN.
 Offline enciphered PIN.
 Offline plaintext PIN and signature.
 Offline enciphered PIN and signature.
 Online PIN.
 No CVM required.
 Both PIN and signature.
 Fail CVM processing.
 The terminal uses a CVM list read from the card to determine the type of verification to
be performed based on the terminal capability and business involved in it.
 When a verification is done successfully the results are updated in TVR and CVR and the
transaction is approved
 A Cardholder Verification Rule (CVR) consists of 2 bytes: the first indicates the type of
CVM to be used, while the second specifies in which condition this CVM will be applied.
Offline Data Processing:
The offline authentication options in EMV are :-
Static Data Authentication:-
 For SDA, the smart card contains application data which is signed by the private key of
the issuer’s RSA key pair.
 When a card with an SDA application is inserted into a terminal, the card sends this
signed static application data, the CA index, and the issuer certificate to the terminal.
 The terminal verifies the issuer certificate and the digital signature by comparing these to
the actual application data present on the card.
 In short, an RSA signature gives the assurance that the data is in fact original and created
by the authorized issuer.
 SDA does not prevent replay attacks as it is the same static data that is presented in every
transaction.
Dynamic Data Authentication:
 In this the smart card has its own card-unique RSA key that signs dynamic data.
 This produces an unique unpredictable and transaction-dependent data, and sends this
to the terminal.
 When a card with a DDA application is inserted into a terminal, the card sends the signed
dynamic application data, the CA index, the issuer certificate and the card certificate to
the terminal.
 The terminal then verifies the issuer certificate, the smart card certificate and the signed
dynamic application data.
Combined Data Authentication:
• The security mechanism in SDA is there to compare what is on the actual card (PAN,
expiry date etc.) with signed data generated at the time of personalization.
• DDA is stronger and makes use of a card resident unique RSA key to dynamically sign
unpredictable and transaction unique data.
• The EMV protocol for transaction approval or denial does contain more logical
processing, and there is a potential weakness between the steps of verifying the
card (using SDA or DDA) and the step comprising of approving the actual
transaction.
• Additionally the card makes that decision based on other card parameters such as
card-generated cryptograms.
• A scheme has been devised that combines both the card authentication and the
transaction approval decision in one step.
• To make it more secure offline PIN verification is present in chip cards to verify the
card holder.
• In addition to this authentication can be done using a PIN to verify that the right
person is using the card
Plaintext PIN verification performed by ICC :
• This is a cost effective cardholder verification method, which is specific for chip card products.
• The terminal captures the PIN from the user and sends it in clear to the chip card. The chip
compares the value received with a witness value stored in its permanent memory.
•The terminal should be offline PIN capable and tamper resistant
Enciphered PIN verification performed by ICC
• This is an expensive cardholder verification method, which is applicable for chip card
products able to perform RSA operations.
• The terminal captures the PIN from the user and sends it encrypted in an RSA envelope to the
chip card.
• The chip decrypts the envelope, retrieves the PIN in clear, and compares the retrieved value
with a witness value stored in its permanent memory since the personalization stage.
• EMV also supports a combined cardholder verification method, which is referred to an
enciphered PIN verification performed by ICC and signature (paper) .
• EMV card keeps a track of number of transactions performed offline using LCOL and UCOL
registers.
• TVR(Terminal Verification Results) TSI(Transaction Verification Information) are the
registers that store the data the authentication that the terminal has performed.
• The TVR is a register encoded on 5 bytes Each byte of the TVR witnesses the results of the
processing performed by the terminal during one of the following stages of the
EMV debit/credit transaction
• Off-line data authentication (byte 1)
• Processing restrictions (byte 2)
• Cardholder verification (byte 3)
• Terminal risk management (byte 4)
• Issuer authentication/issuer scripts processing (byte 5)
EMV Migration
 The EMV Migration Forum is an independent, cross-industry body created by the Smart Card
Alliance in order to successfully introduce secure EMV contact and contactless technology in
the United States by liability shift.
 Liability shift means that those issuers and merchants using non-EMV compliant devices that
choose to accept transactions made with EMV-compliant cards assume liability for any and
all transactions that are found to be fraudulent.
 The deadline for liability shift as decided by EMV Co is October 2015 in US.
 To date, Europe, Canada, Latin America, and the Asia/Pacific region are all well on their way
with migrating from the legacy magnetic stripe standard to EMV chip card technology.
 Estimated cost calculation for EMV migration in US.
Liability Table
• This is Applicable to Visa , MasterCard and American Express Associations
EMV Adaption at various regions in world
Security for E-Commerce
 EMV cards were designed when E commerce was not fully operational.
 Various other methods were introduced to make transaction secure:
 CVV Number
 Address Verification System(AVS)
 Dynamic number Verification System.
 In Future cards will be designed to produce dynamic number using the Chip technology.
TransArmor Tokenization and Encryption Solution
• The data is protected by two layers of security, known as encryption and tokenization.
Benefits of Tokenization
 Reduces the risk of stored Primary Account Numbers (PANs) in their card data environment
(CDE).
 The tokens can then be used to perform customer analytics and understand consumer
buying behavior.
 Replacing PAN data with tokens reduces a merchant’s burden of PCI compliance by taking
sensitive data out of their databae.
 Used for Recurring Payments.

More Related Content

What's hot

Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
Narudom Roongsiriwong, CISSP
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
Ashraf Bashir
 
Payment gateway testing
Payment gateway testingPayment gateway testing
Payment gateway testingAtul Pant
 
Ec2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systemsEc2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systems
Nuth Otanasap
 
Payment gateway
Payment gatewayPayment gateway
Payment gateway
HananBahy
 
Online payment gateway provider
Online payment gateway providerOnline payment gateway provider
Online payment gateway provider
Payment Gateways
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital Payments
Santosh Potadar
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
Md. AManullah Galib
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
Nyros Technologies
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
Nishad Mp
 
Banking Cards And Emv
Banking Cards And EmvBanking Cards And Emv
Banking Cards And EmvKingshuk1
 
Digital cash
Digital cashDigital cash
Digital cash
Urwi Keche
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
Suraj Dhalwar
 
Payment gateways
Payment gateways Payment gateways
Payment gateways
NiyasudheenAK
 
Ewallet
EwalletEwallet
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?
Rambus Inc
 
Chapter 8 / Electronic Payment
Chapter 8 / Electronic  PaymentChapter 8 / Electronic  Payment
Chapter 8 / Electronic Payment
Eyad Almasri
 
eZ Publish Workflows and Payment Gateways
eZ Publish Workflows and Payment GatewayseZ Publish Workflows and Payment Gateways
eZ Publish Workflows and Payment Gateways
Graham Brookins
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
svm
 
The Mobile Wallet
The Mobile WalletThe Mobile Wallet
The Mobile Walletmidhun jose
 

What's hot (20)

Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Payment gateway testing
Payment gateway testingPayment gateway testing
Payment gateway testing
 
Ec2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systemsEc2009 ch11 electronic payment systems
Ec2009 ch11 electronic payment systems
 
Payment gateway
Payment gatewayPayment gateway
Payment gateway
 
Online payment gateway provider
Online payment gateway providerOnline payment gateway provider
Online payment gateway provider
 
Understanding Digital Payments
Understanding Digital PaymentsUnderstanding Digital Payments
Understanding Digital Payments
 
Digital Signature.pptx
Digital Signature.pptxDigital Signature.pptx
Digital Signature.pptx
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
Banking Cards And Emv
Banking Cards And EmvBanking Cards And Emv
Banking Cards And Emv
 
Digital cash
Digital cashDigital cash
Digital cash
 
Set Secure Electronic Transaction (SET)
Set Secure Electronic Transaction(SET)Set Secure Electronic Transaction(SET)
Set Secure Electronic Transaction (SET)
 
Payment gateways
Payment gateways Payment gateways
Payment gateways
 
Ewallet
EwalletEwallet
Ewallet
 
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?
 
Chapter 8 / Electronic Payment
Chapter 8 / Electronic  PaymentChapter 8 / Electronic  Payment
Chapter 8 / Electronic Payment
 
eZ Publish Workflows and Payment Gateways
eZ Publish Workflows and Payment GatewayseZ Publish Workflows and Payment Gateways
eZ Publish Workflows and Payment Gateways
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
The Mobile Wallet
The Mobile WalletThe Mobile Wallet
The Mobile Wallet
 

Viewers also liked

HSM Basic Training
HSM Basic TrainingHSM Basic Training
HSM Basic Training
Md. Budrul Hasan Bhuiyan
 
Emv overview-payscape-2015 (1)
Emv overview-payscape-2015 (1)Emv overview-payscape-2015 (1)
Emv overview-payscape-2015 (1)
Karina Khemani
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
Lennon808
 
Emv and fraud
Emv and fraudEmv and fraud
Emv and fraud
Ujwal Tamminedi
 
EMV: What you Need to Know
EMV: What you Need to KnowEMV: What you Need to Know
EMV: What you Need to Know
Total Merchant Services
 
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip CardsReport on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip CardsDarshana Senavirathna
 
Unified Payment Interface
Unified Payment InterfaceUnified Payment Interface
Unified Payment InterfaceAkash Chandra
 
EMV, P2PE, or both?
EMV, P2PE, or both?EMV, P2PE, or both?
EMV, P2PE, or both?
UnitedThinkers
 
EMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of SaleEMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of Sale
- Mark - Fullbright
 
Chip Cards: EMV Updates for Parking
Chip Cards: EMV Updates for ParkingChip Cards: EMV Updates for Parking
Chip Cards: EMV Updates for ParkingCreditcall
 
14 key management & exchange
14   key management & exchange14   key management & exchange
14 key management & exchangedrewz lin
 
Summit Keynote: Banks and EMV
Summit Keynote: Banks and EMVSummit Keynote: Banks and EMV
Summit Keynote: Banks and EMVVivastream
 
Spelunking Credit Cards with Ruby
Spelunking Credit Cards with RubySpelunking Credit Cards with Ruby
Spelunking Credit Cards with RubySau Sheong Chang
 
Chip card ppt
Chip card pptChip card ppt
Chip card ppt
Himanshu Chopra
 
Comparable and comparator – a detailed discussion
Comparable and comparator – a detailed discussionComparable and comparator – a detailed discussion
Comparable and comparator – a detailed discussion
Dharmendra Prasad
 
Opening a New Conversation with Business Leaders: It's Time For Action
Opening a New Conversation with Business Leaders: It's Time For ActionOpening a New Conversation with Business Leaders: It's Time For Action
Opening a New Conversation with Business Leaders: It's Time For Action
Laura Overton
 
Spring Portlet MVC
Spring Portlet MVCSpring Portlet MVC
Spring Portlet MVC
John Lewis
 

Viewers also liked (20)

HSM Basic Training
HSM Basic TrainingHSM Basic Training
HSM Basic Training
 
Emv overview-payscape-2015 (1)
Emv overview-payscape-2015 (1)Emv overview-payscape-2015 (1)
Emv overview-payscape-2015 (1)
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 
Emv and fraud
Emv and fraudEmv and fraud
Emv and fraud
 
EMV: What you Need to Know
EMV: What you Need to KnowEMV: What you Need to Know
EMV: What you Need to Know
 
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip CardsReport on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
 
Unified Payment Interface
Unified Payment InterfaceUnified Payment Interface
Unified Payment Interface
 
Payment Hsm Payshield9000
Payment Hsm Payshield9000Payment Hsm Payshield9000
Payment Hsm Payshield9000
 
EMV, P2PE, or both?
EMV, P2PE, or both?EMV, P2PE, or both?
EMV, P2PE, or both?
 
EMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of SaleEMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of Sale
 
Chip Cards: EMV Updates for Parking
Chip Cards: EMV Updates for ParkingChip Cards: EMV Updates for Parking
Chip Cards: EMV Updates for Parking
 
14 key management & exchange
14   key management & exchange14   key management & exchange
14 key management & exchange
 
EMV Technology_Risk Management
EMV Technology_Risk ManagementEMV Technology_Risk Management
EMV Technology_Risk Management
 
Summit Keynote: Banks and EMV
Summit Keynote: Banks and EMVSummit Keynote: Banks and EMV
Summit Keynote: Banks and EMV
 
Spelunking Credit Cards with Ruby
Spelunking Credit Cards with RubySpelunking Credit Cards with Ruby
Spelunking Credit Cards with Ruby
 
Chip card ppt
Chip card pptChip card ppt
Chip card ppt
 
Comparable and comparator – a detailed discussion
Comparable and comparator – a detailed discussionComparable and comparator – a detailed discussion
Comparable and comparator – a detailed discussion
 
Opening a New Conversation with Business Leaders: It's Time For Action
Opening a New Conversation with Business Leaders: It's Time For ActionOpening a New Conversation with Business Leaders: It's Time For Action
Opening a New Conversation with Business Leaders: It's Time For Action
 
Spring Portlet MVC
Spring Portlet MVCSpring Portlet MVC
Spring Portlet MVC
 
v 1.0
v 1.0v 1.0
v 1.0
 

Similar to EMV chip cards

EMV Credit Card Technology in Parking
EMV Credit Card Technology in ParkingEMV Credit Card Technology in Parking
EMV Credit Card Technology in Parking
Parking & Traffic Consultants
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process
- Mark - Fullbright
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
Narudom Roongsiriwong, CISSP
 
P1Cab Company Schedulinglet Di = # of drivers who start their 8 ho.docx
P1Cab Company Schedulinglet Di = # of drivers who start their 8 ho.docxP1Cab Company Schedulinglet Di = # of drivers who start their 8 ho.docx
P1Cab Company Schedulinglet Di = # of drivers who start their 8 ho.docx
gerardkortney
 
Merchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote CommerceMerchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote Commerce
Netcetera
 
Card payment evolution v1.0
Card payment evolution v1.0Card payment evolution v1.0
Card payment evolution v1.0
Nugroho Gito
 
Can security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerceCan security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerce
Mercury Processing Services International
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
Journal For Research
 
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Netcetera
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Danail Yotov
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment SystemRitesh Goyal
 
Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIT
hiteshasnani94
 
Shift Happens. What You Need to Know About EMV & The October Deadline
Shift Happens. What You Need to Know About EMV & The October DeadlineShift Happens. What You Need to Know About EMV & The October Deadline
Shift Happens. What You Need to Know About EMV & The October Deadline
Constellation Payments
 
Out of Scope Whitepaper
Out of Scope WhitepaperOut of Scope Whitepaper
Out of Scope Whitepaper
Mark Moreno
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment systempankhadi
 
Best Law Firms in India - Khaitan Legal Associates.pptx
Best Law Firms in India - Khaitan Legal Associates.pptxBest Law Firms in India - Khaitan Legal Associates.pptx
Best Law Firms in India - Khaitan Legal Associates.pptx
Rani Sinha
 

Similar to EMV chip cards (20)

EMV Credit Card Technology in Parking
EMV Credit Card Technology in ParkingEMV Credit Card Technology in Parking
EMV Credit Card Technology in Parking
 
EMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment ProcessEMV: Preparing for Changes to the Retail Payment Process
EMV: Preparing for Changes to the Retail Payment Process
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
P1Cab Company Schedulinglet Di = # of drivers who start their 8 ho.docx
P1Cab Company Schedulinglet Di = # of drivers who start their 8 ho.docxP1Cab Company Schedulinglet Di = # of drivers who start their 8 ho.docx
P1Cab Company Schedulinglet Di = # of drivers who start their 8 ho.docx
 
Merchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote CommerceMerchant tokenization and EMV® Secure Remote Commerce
Merchant tokenization and EMV® Secure Remote Commerce
 
Card payment evolution v1.0
Card payment evolution v1.0Card payment evolution v1.0
Card payment evolution v1.0
 
Can security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerceCan security and convenience go hand in hand in e-commerce
Can security and convenience go hand in hand in e-commerce
 
QR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONSQR BASED CARD-LESS ATM TRANSACTIONS
QR BASED CARD-LESS ATM TRANSACTIONS
 
Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...Increase conversion, convenience and security in e-commerce checkouts - Silke...
Increase conversion, convenience and security in e-commerce checkouts - Silke...
 
Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...Payment gateway/payment service providers and future trends in mobile payment...
Payment gateway/payment service providers and future trends in mobile payment...
 
Heartland Secure PPT
Heartland Secure PPTHeartland Secure PPT
Heartland Secure PPT
 
Ch 2
Ch 2Ch 2
Ch 2
 
Electronic Payment System
Electronic Payment SystemElectronic Payment System
Electronic Payment System
 
Payment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVITPayment card security By Hitesh Asnani SVIT
Payment card security By Hitesh Asnani SVIT
 
Shift Happens. What You Need to Know About EMV & The October Deadline
Shift Happens. What You Need to Know About EMV & The October DeadlineShift Happens. What You Need to Know About EMV & The October Deadline
Shift Happens. What You Need to Know About EMV & The October Deadline
 
Class 13
Class 13Class 13
Class 13
 
Out of Scope Whitepaper
Out of Scope WhitepaperOut of Scope Whitepaper
Out of Scope Whitepaper
 
Electronic payment system
Electronic payment systemElectronic payment system
Electronic payment system
 
Best Law Firms in India - Khaitan Legal Associates.pptx
Best Law Firms in India - Khaitan Legal Associates.pptxBest Law Firms in India - Khaitan Legal Associates.pptx
Best Law Firms in India - Khaitan Legal Associates.pptx
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 

EMV chip cards

  • 2. Contents  Introduction to EMV  Traditional MSR Vs EMV Transaction flow  Online Data Authentication  Offline Data Authentication  EMV Migration  Security in E-Commerce
  • 3. Introduction to EMV  EMV is a technical standard that defines interaction at the physical and electrical data authentication levels between IC cards and their processing devices for financial transactions .  EMV stands for EuroPay, MasterCard, and Visa, the three companies which originally created the standard.  The standard is now managed by EMVCo, a consortium with control split equally among Visa, Mastercard, JCB, American Express, China Union Pay, and Discover.  EMV cards are also called as IC credit Chip and PIN Cards.  EMV cards were introduced to improve security (Fraud Reduction) and for finer control of "offline" credit-card transaction approvals.  One of the original goals of EMV was to allow for multiple applications to be held on a card: for a credit and debit card application or an e-purse.
  • 4. MSR Vs EMV Transaction Flow
  • 6. EMV Transaction Flow Application Selection:  EMV chip is loaded with a application version number and the Application Identification Numbers(AID’s) that the issuer supports.  Based on the AID selected a particular Application in the terminal is selected through which routing to the Issuer bank do happen.  The PDOL (Processing Data Object Lists) is provided by the card to the terminal during application selection.
  • 7. Terminal Action Analysis  Terminal risk management is done in the terminal to decide whether or not to go online, checks the transaction amount against an offline ceiling limit.  For online authorization transactions CDOL1 (Card Data object List),a list of tags that the card wants to be sent to it to make a decision on whether to approve or decline a transaction.  Terminal sends this data and requests a cryptogram using the generate application cryptogram command usually called 1st Gen AC  Depending on the terminal′s decision (offline, online, decline), the terminal requests one of the following cryptograms from the card:  Transaction certificate (TC)—Offline approval  Authorization Request Cryptogram (ARQC)—Online authorization  Application Authentication Cryptogram (AAC)—Offline decline.  The issuer responds to an authorization request with a response code (accepting or declining the transaction), an authorization response cryptogram (ARPC) and optionally an issuer script (a string of commands to be sent to the card).
  • 8. EMV Chip Data The data that is present in a chip card and few tags are sent to the issuer for authorization
  • 9. Cardholder verification  Cardholder verification is used to evaluate whether the person presenting the card is the legitimate cardholder. There are many cardholder verification methods (CVMs) supported in EMV. They are:  Signature.  Offline plaintext PIN.  Offline enciphered PIN.  Offline plaintext PIN and signature.  Offline enciphered PIN and signature.  Online PIN.  No CVM required.  Both PIN and signature.  Fail CVM processing.  The terminal uses a CVM list read from the card to determine the type of verification to be performed based on the terminal capability and business involved in it.  When a verification is done successfully the results are updated in TVR and CVR and the transaction is approved  A Cardholder Verification Rule (CVR) consists of 2 bytes: the first indicates the type of CVM to be used, while the second specifies in which condition this CVM will be applied.
  • 10. Offline Data Processing: The offline authentication options in EMV are :- Static Data Authentication:-  For SDA, the smart card contains application data which is signed by the private key of the issuer’s RSA key pair.  When a card with an SDA application is inserted into a terminal, the card sends this signed static application data, the CA index, and the issuer certificate to the terminal.  The terminal verifies the issuer certificate and the digital signature by comparing these to the actual application data present on the card.  In short, an RSA signature gives the assurance that the data is in fact original and created by the authorized issuer.  SDA does not prevent replay attacks as it is the same static data that is presented in every transaction. Dynamic Data Authentication:  In this the smart card has its own card-unique RSA key that signs dynamic data.  This produces an unique unpredictable and transaction-dependent data, and sends this to the terminal.  When a card with a DDA application is inserted into a terminal, the card sends the signed dynamic application data, the CA index, the issuer certificate and the card certificate to the terminal.  The terminal then verifies the issuer certificate, the smart card certificate and the signed dynamic application data.
  • 11. Combined Data Authentication: • The security mechanism in SDA is there to compare what is on the actual card (PAN, expiry date etc.) with signed data generated at the time of personalization. • DDA is stronger and makes use of a card resident unique RSA key to dynamically sign unpredictable and transaction unique data. • The EMV protocol for transaction approval or denial does contain more logical processing, and there is a potential weakness between the steps of verifying the card (using SDA or DDA) and the step comprising of approving the actual transaction. • Additionally the card makes that decision based on other card parameters such as card-generated cryptograms. • A scheme has been devised that combines both the card authentication and the transaction approval decision in one step. • To make it more secure offline PIN verification is present in chip cards to verify the card holder. • In addition to this authentication can be done using a PIN to verify that the right person is using the card
  • 12. Plaintext PIN verification performed by ICC : • This is a cost effective cardholder verification method, which is specific for chip card products. • The terminal captures the PIN from the user and sends it in clear to the chip card. The chip compares the value received with a witness value stored in its permanent memory. •The terminal should be offline PIN capable and tamper resistant Enciphered PIN verification performed by ICC • This is an expensive cardholder verification method, which is applicable for chip card products able to perform RSA operations. • The terminal captures the PIN from the user and sends it encrypted in an RSA envelope to the chip card. • The chip decrypts the envelope, retrieves the PIN in clear, and compares the retrieved value with a witness value stored in its permanent memory since the personalization stage. • EMV also supports a combined cardholder verification method, which is referred to an enciphered PIN verification performed by ICC and signature (paper) . • EMV card keeps a track of number of transactions performed offline using LCOL and UCOL registers.
  • 13. • TVR(Terminal Verification Results) TSI(Transaction Verification Information) are the registers that store the data the authentication that the terminal has performed. • The TVR is a register encoded on 5 bytes Each byte of the TVR witnesses the results of the processing performed by the terminal during one of the following stages of the EMV debit/credit transaction • Off-line data authentication (byte 1) • Processing restrictions (byte 2) • Cardholder verification (byte 3) • Terminal risk management (byte 4) • Issuer authentication/issuer scripts processing (byte 5)
  • 14. EMV Migration  The EMV Migration Forum is an independent, cross-industry body created by the Smart Card Alliance in order to successfully introduce secure EMV contact and contactless technology in the United States by liability shift.  Liability shift means that those issuers and merchants using non-EMV compliant devices that choose to accept transactions made with EMV-compliant cards assume liability for any and all transactions that are found to be fraudulent.  The deadline for liability shift as decided by EMV Co is October 2015 in US.  To date, Europe, Canada, Latin America, and the Asia/Pacific region are all well on their way with migrating from the legacy magnetic stripe standard to EMV chip card technology.  Estimated cost calculation for EMV migration in US.
  • 15. Liability Table • This is Applicable to Visa , MasterCard and American Express Associations
  • 16. EMV Adaption at various regions in world
  • 17. Security for E-Commerce  EMV cards were designed when E commerce was not fully operational.  Various other methods were introduced to make transaction secure:  CVV Number  Address Verification System(AVS)  Dynamic number Verification System.  In Future cards will be designed to produce dynamic number using the Chip technology.
  • 18. TransArmor Tokenization and Encryption Solution • The data is protected by two layers of security, known as encryption and tokenization.
  • 19. Benefits of Tokenization  Reduces the risk of stored Primary Account Numbers (PANs) in their card data environment (CDE).  The tokens can then be used to perform customer analytics and understand consumer buying behavior.  Replacing PAN data with tokens reduces a merchant’s burden of PCI compliance by taking sensitive data out of their databae.  Used for Recurring Payments.