SlideShare a Scribd company logo
 
Agenda
PAYMENT & SECURITY TRENDS
Payments: The story so far… “… Globally, the drive to increase (card) payments efficiency and security is relentless…” “… Globalisation is increasingly emphasising the need for widely accessible, seamless, & secure ways of effecting non-cash payments to facilitate consumer spending, and to reduce fraud and money laundering.…” “… More efficient, effective systems could also help lessen systemic risk & potentially provide a source of additional retail revenue for banks.…”
Vietnam embraces the electronic era “… Vietnam is regarded by the global banking industry as one of the most fertile growth hotspots in the world, particularly for cards and electronic payments….” VRL Financial News,  October 2009
Security: The story so far… “… increased incidences of ATM and card  skimming.…” “… the need to reassure cardholders about the safety and security of card transactions.…” “ Statistics from 2007 show the level of payment card fraud in Vietnam stood at 0.15 percent of total card payments, a much higher level than the global average of 0.06 percent.”
E2EE: What is it? Computer Desktop Encyclopedia “… is defined as the continuous protection of the confidentiality and integrity of transmitted information by encrypting it at the origin and decrypting at its destination.…”
E2EE: The story so far… Smart Card Alliance  Sept 2009
KEY CONCEPTS OF TLE
In cryptography,  encryption , is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is  encrypted  information (Wikipedia) en·cryp·tion  /-'krip-sh&n/
MAC-ing is the process of “fingerprinting” data to allow any tampering to be detected, where the fingerprint is encrypted so only Sender/Receiver can form a real MAC and thus, allowing the receiver to authenticate & verify the message Message Authentication Code
THE MALAYSIAN EXPERIENCE
Real Tapping Threats
Wire tapping threats
A brief look at history…
The Line Encryption Working Group
Design Parameters
Key  Considerations
[object Object],[object Object],Minimum Data Encryption Requirements ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],MAC algorithm ENC algorithm Key Differentiation Key Usage Key Storage ENC Data elements 2 2 4 2 4 3
General Approaches Host-based Host HSM NAC NAC-based Host Interception-based Host NAC SNAC NAC NAC NAC NAC NAC
Data Center Host NAC TLE: Typical Transaction Flow Terminal Encrypt selected fields in transaction 1 Send to Host 4 Decrypt & validate transaction 2 Reform to original message 3 Response from Host 5 Encrypt & MAC response 6 Decrypt & validate response message 7
THE RESULTS
The Results… Source: Visa VPSS Payment Security Bulettin, 2006
The Results… Source: Visa VPSS Payment Security Bulettin, 2006
The Results… Source: Visa VPSS Payment Security Bulettin, 2006
The Results… Source: Visa VPSS Payment Security Bulettin, 2006
The Results…
Payments: The story today… Source:  BNM, 2009 Financial Stability and Payment Systems Report 2008
Payments: The story today “… (card fraud) losses continued to be insignificant, accounting for less than 0.04% of total card transactions during the year.”
PAYMENT SECURITY MYTHS
Encryption Myths
Summary: Considerations for TLE Addresses all threats Addresses Implementation issues Addresses Deployment Issues Addresses Administration Issues Multi-channel & multi-device Support Remote Key Injection Vendor Independence Performance  Cost-Effective
Additional References ,[object Object],[object Object],[object Object],[object Object],[object Object]
WHAT IS NETMATRIX TLE?
NetMATRIX TLE (Terminal Line Encryption) is a plug-and-play solution for banks who wish to introduce  terminal line encryption  into their POS network infrastructure Net MATRIX Terminal Line Encryption
NetMATRIX TLE: Approach Host-based Host HSM NAC NAC-based Host Interception-based Host NAC SNAC NAC NAC NAC NAC NAC
Key  Considerations
Key Features
Key Features
NETMATRIX ARCHITECTURE
Credit Card Host NII: 160 “ Typical” Transaction Flow Issuing  Bank Host Acquiring  Bank EDC Terminals Switching NAC Remote NAC Remote NAC Net MATRIX Acquiring Host 160 Message
Credit Card Host NII: 160 NetMATRIX TLE NII: 161 Encrypted Transaction Flow Issuing  Bank Host Net MATRIX Acquiring  Bank Acquiring Host EDC Terminals Switching NAC Remote NAC Remote NAC 161 Enc Message 160 Enc Message
Encrypted Transaction Flow II Credit Card Host NII: 160 NetMATRIX TLE NII: 161 Net MATRIX Acquiring  Bank Acquiring Host Issuing  Bank Host EDC Terminals Switching NAC Remote NAC Remote NAC 161 Enc Message 160 Enc Message
Data Center Host NAC NetMATRIX: How it Works Terminal Encrypt selected fields in transaction 1 Send to Host 4 Decrypt & validate transaction 2 Reform to original message 3 Response from Host 5 Encrypt & MAC response 6 Decrypt & validate response message 7
Efficiency: Clustering & Load-Balancing Load Balancing Host NAC TCP/IP Cluster
Business Continuity: Auto-Failover TCP/IP Failover Host NAC TCP/IP Cluster
GHL SYSTEMS
Our Mission To be the leading end-to-end  payment services enabler  in the Asia-Pacific region,  deploying world-class  payment infrastructure, technology and services
Products & Services offerings World-class payment infrastructure, services and technology: Transaction routers & concentrators Terminal Line Encryption technologies Loyalty & Online Payment solutions Smartcard technologies 24x7 Managed Network Services Consulting Services Terminal Management Solutions Contactless Payments
Complete Payment Network Integration
Addressing Strategic Needs
GHL Systems Regional Presence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Accolades & Accomplishments ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Malaysia Singapore Indonesia Vietnam Brunei Customer References
Philippines China / Hong Kong Middle East Romania Asia/Pacific Australia / New Zealand Thailand Customer References
Thank you Alex Tan Vice President – International Sales [email_address]

More Related Content

What's hot

Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for Dummies
Silly Beez
 
Payment gateway
Payment gatewayPayment gateway
Payment gateway
HananBahy
 
Secure Electronic Transaction
Secure Electronic TransactionSecure Electronic Transaction
Secure Electronic Transaction
United International University
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
ShujaShah
 
SWIFT secure financial messaging services key facts and information
SWIFT secure financial messaging services key facts and informationSWIFT secure financial messaging services key facts and information
SWIFT secure financial messaging services key facts and information
AccessPay
 
Payment gateway
Payment gatewayPayment gateway
Payment gateway
Piyush Dua
 
EMV Overview
EMV OverviewEMV Overview
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
Ashraf Bashir
 
Payment Gateway
Payment Gateway Payment Gateway
Payment Gateway
Rohit Srivastav
 
Emv Explained in few words
Emv Explained in few words Emv Explained in few words
Emv Explained in few words
Banque Populaire Du Rwanda
 
Cryptography
CryptographyCryptography
Cryptography
herrberk
 
Email security
Email securityEmail security
Email security
Indrajit Sreemany
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
Rishi Pathak
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
Vlad Petre
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6limsh
 
Swift standard messages
Swift standard messagesSwift standard messages
Swift standard messagesPeter Hansen
 
An introduction to SwiftNET
An introduction to SwiftNETAn introduction to SwiftNET
An introduction to SwiftNET
Rishabh Dangwal
 

What's hot (20)

Smart Card EMV for Dummies
Smart Card EMV for DummiesSmart Card EMV for Dummies
Smart Card EMV for Dummies
 
Payment gateway
Payment gatewayPayment gateway
Payment gateway
 
Web payment system
Web payment system Web payment system
Web payment system
 
Secure Electronic Transaction
Secure Electronic TransactionSecure Electronic Transaction
Secure Electronic Transaction
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
SWIFT secure financial messaging services key facts and information
SWIFT secure financial messaging services key facts and informationSWIFT secure financial messaging services key facts and information
SWIFT secure financial messaging services key facts and information
 
Payment gateway
Payment gatewayPayment gateway
Payment gateway
 
EMV Overview
EMV OverviewEMV Overview
EMV Overview
 
Payment Gateway
Payment GatewayPayment Gateway
Payment Gateway
 
Payment Gateway
Payment Gateway Payment Gateway
Payment Gateway
 
Emv Explained in few words
Emv Explained in few words Emv Explained in few words
Emv Explained in few words
 
Cryptography
CryptographyCryptography
Cryptography
 
Email security
Email securityEmail security
Email security
 
Digital signature & eSign overview
Digital signature & eSign overviewDigital signature & eSign overview
Digital signature & eSign overview
 
The 3-D Secure Protocol
The 3-D Secure ProtocolThe 3-D Secure Protocol
The 3-D Secure Protocol
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
E wallet
E walletE wallet
E wallet
 
Swift standard messages
Swift standard messagesSwift standard messages
Swift standard messages
 
An introduction to SwiftNET
An introduction to SwiftNETAn introduction to SwiftNET
An introduction to SwiftNET
 

Viewers also liked

Millennials: The young generation shaping the future
Millennials: The young generation shaping the future Millennials: The young generation shaping the future
Millennials: The young generation shaping the future
DigitasLBi Nordics
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
Govindarrajan NV
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
Todd Merrill
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryption
Venkatesh Kariappa
 
End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed Applications
Jeff Lambert
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Syuan Wang
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
Lennon808
 

Viewers also liked (8)

Millennials: The young generation shaping the future
Millennials: The young generation shaping the future Millennials: The young generation shaping the future
Millennials: The young generation shaping the future
 
Review on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integrationReview on Whatsapp's End to End encryption and Facebook integration
Review on Whatsapp's End to End encryption and Facebook integration
 
End-to-end encryption explained
End-to-end encryption explainedEnd-to-end encryption explained
End-to-end encryption explained
 
WhatsApp End to End encryption
WhatsApp End to End encryptionWhatsApp End to End encryption
WhatsApp End to End encryption
 
End-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed ApplicationsEnd-to-End Encryption of Distributed Applications
End-to-End Encryption of Distributed Applications
 
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM SystemLabmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
Labmeeting - 20150211 - Novel End-to-End Voice Encryption Method in GSM System
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
End-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card ProcessingEnd-to-End Encryption for Credit Card Processing
End-to-End Encryption for Credit Card Processing
 

Similar to NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES, End-to-end encryption (E2EE), Multiple MACing algorithms, Local and remote secure key injection

Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Amila Gamanayake
 
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
Priyanka Aash
 
EMV Credit Card Technology in Parking
EMV Credit Card Technology in ParkingEMV Credit Card Technology in Parking
EMV Credit Card Technology in Parking
Parking & Traffic Consultants
 
Furture_of_banking
Furture_of_bankingFurture_of_banking
Furture_of_banking
rclalwani
 
E Finance Er. S Sood
E Finance Er. S SoodE Finance Er. S Sood
E Finance Er. S Sood
shart sood
 
E Finance Er. S Sood
E Finance Er. S SoodE Finance Er. S Sood
E Finance Er. S Sood
shart sood
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - final
Alex Tan
 
Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bank
Steve Sidner
 
7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar
Ingenico Group
 
EMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of SaleEMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of Sale
- Mark - Fullbright
 
Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023
Vladislav Solodkiy
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Greg Stone
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011jhatch9418
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment SecurityTom Cooley
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
IRJET Journal
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Michelle Morgan-Nelsen
 

Similar to NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES, End-to-end encryption (E2EE), Multiple MACing algorithms, Local and remote secure key injection (20)

Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)Online transaction security (an undergraduate independent study)
Online transaction security (an undergraduate independent study)
 
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
FOR THE LOVE OF MONEY: Finding and exploiting vulnerabilities in mobile point...
 
EMV Credit Card Technology in Parking
EMV Credit Card Technology in ParkingEMV Credit Card Technology in Parking
EMV Credit Card Technology in Parking
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 
Jaiyadav
JaiyadavJaiyadav
Jaiyadav
 
Jaiyadav
JaiyadavJaiyadav
Jaiyadav
 
Furtureofbanking
FurtureofbankingFurtureofbanking
Furtureofbanking
 
Furture_of_banking
Furture_of_bankingFurture_of_banking
Furture_of_banking
 
E Finance Er. S Sood
E Finance Er. S SoodE Finance Er. S Sood
E Finance Er. S Sood
 
E Finance Er. S Sood
E Finance Er. S SoodE Finance Er. S Sood
E Finance Er. S Sood
 
Secure ip payment networks what's available other than ssl - final
Secure ip payment networks   what's available other than ssl - finalSecure ip payment networks   what's available other than ssl - final
Secure ip payment networks what's available other than ssl - final
 
Iiw13 identifying with_your_bank
Iiw13 identifying with_your_bankIiw13 identifying with_your_bank
Iiw13 identifying with_your_bank
 
7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar7 Ways to Make EMV Easier / Webinar
7 Ways to Make EMV Easier / Webinar
 
EMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of SaleEMV Payments: Changes at the Point of Sale
EMV Payments: Changes at the Point of Sale
 
Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023Cash Is Still King: ATM market research '2023
Cash Is Still King: ATM market research '2023
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
 
QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011QSecure Presentation at RSA 2011
QSecure Presentation at RSA 2011
 
The Path to Payment Security
The Path to Payment SecurityThe Path to Payment Security
The Path to Payment Security
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security ThreatsBank ATM Security to Combat Physical and Logical Cyber Security Threats
Bank ATM Security to Combat Physical and Logical Cyber Security Threats
 

More from Alex Tan

NetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL SystemsNetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL Systems
Alex Tan
 
ATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless ConnectivityATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless ConnectivityAlex Tan
 
Netaccess introduction
Netaccess introductionNetaccess introduction
Netaccess introductionAlex Tan
 
Net Access L 300 Training Slides
Net Access L 300 Training SlidesNet Access L 300 Training Slides
Net Access L 300 Training Slides
Alex Tan
 
Net Access L 200 Training Slides
Net Access L 200 Training SlidesNet Access L 200 Training Slides
Net Access L 200 Training Slides
Alex Tan
 
Net access web page configurations
Net access web page configurationsNet access web page configurations
Net access web page configurationsAlex Tan
 
Ghl systems net access w & n series presentation sept 2009 for wnb
Ghl systems net access w & n series presentation   sept 2009 for wnbGhl systems net access w & n series presentation   sept 2009 for wnb
Ghl systems net access w & n series presentation sept 2009 for wnb
Alex Tan
 
L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...
Alex Tan
 
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
Alex Tan
 
Ghl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_studyGhl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_studyAlex Tan
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
Alex Tan
 
Net access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentationNet access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentationAlex Tan
 
Ghl systems may 2010
Ghl systems may 2010Ghl systems may 2010
Ghl systems may 2010Alex Tan
 
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
Alex Tan
 
Ghl success stories retail series aug 2010
Ghl success stories   retail series aug 2010Ghl success stories   retail series aug 2010
Ghl success stories retail series aug 2010Alex Tan
 
Ghl success stories transportation series - mar 2010
Ghl success stories   transportation series - mar 2010Ghl success stories   transportation series - mar 2010
Ghl success stories transportation series - mar 2010Alex Tan
 
Ghl systems customer success story zouk kl
Ghl systems customer success story  zouk klGhl systems customer success story  zouk kl
Ghl systems customer success story zouk klAlex Tan
 
Ghl systems customer success story shoemart
Ghl systems customer success story shoemartGhl systems customer success story shoemart
Ghl systems customer success story shoemartAlex Tan
 
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Alex Tan
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
Alex Tan
 

More from Alex Tan (20)

NetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL SystemsNetAccess W1000 WAN transaction router GHL Systems
NetAccess W1000 WAN transaction router GHL Systems
 
ATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless ConnectivityATM Deployers Moving Towards Wireless Connectivity
ATM Deployers Moving Towards Wireless Connectivity
 
Netaccess introduction
Netaccess introductionNetaccess introduction
Netaccess introduction
 
Net Access L 300 Training Slides
Net Access L 300 Training SlidesNet Access L 300 Training Slides
Net Access L 300 Training Slides
 
Net Access L 200 Training Slides
Net Access L 200 Training SlidesNet Access L 200 Training Slides
Net Access L 200 Training Slides
 
Net access web page configurations
Net access web page configurationsNet access web page configurations
Net access web page configurations
 
Ghl systems net access w & n series presentation sept 2009 for wnb
Ghl systems net access w & n series presentation   sept 2009 for wnbGhl systems net access w & n series presentation   sept 2009 for wnb
Ghl systems net access w & n series presentation sept 2009 for wnb
 
L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...L 200 optimus payment data voice concentration of multiple downlink devices i...
L 200 optimus payment data voice concentration of multiple downlink devices i...
 
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
NetMatrix TLE minimum data encryption guidelines end to end encryption termin...
 
Ghl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_studyGhl net access_deployments_presentation_-_ikea_case_study
Ghl net access_deployments_presentation_-_ikea_case_study
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
 
Net access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentationNet access multi-lane_deployments_presentation
Net access multi-lane_deployments_presentation
 
Ghl systems may 2010
Ghl systems may 2010Ghl systems may 2010
Ghl systems may 2010
 
Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010Ghl systems net matrix terminal line encryption 2009 2010
Ghl systems net matrix terminal line encryption 2009 2010
 
Ghl success stories retail series aug 2010
Ghl success stories   retail series aug 2010Ghl success stories   retail series aug 2010
Ghl success stories retail series aug 2010
 
Ghl success stories transportation series - mar 2010
Ghl success stories   transportation series - mar 2010Ghl success stories   transportation series - mar 2010
Ghl success stories transportation series - mar 2010
 
Ghl systems customer success story zouk kl
Ghl systems customer success story  zouk klGhl systems customer success story  zouk kl
Ghl systems customer success story zouk kl
 
Ghl systems customer success story shoemart
Ghl systems customer success story shoemartGhl systems customer success story shoemart
Ghl systems customer success story shoemart
 
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
Net Access W & N Presentation, Switching NAC, Network transaction concentrato...
 
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
NetAccess L-Series Payment Routers, Network transaction concentrator plug-and...
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 

NetMatrix TLE Terminal Line Encryption. SPVA certified, DUKPT, 3DES, DES, AES, End-to-end encryption (E2EE), Multiple MACing algorithms, Local and remote secure key injection

  • 1.  
  • 4. Payments: The story so far… “… Globally, the drive to increase (card) payments efficiency and security is relentless…” “… Globalisation is increasingly emphasising the need for widely accessible, seamless, & secure ways of effecting non-cash payments to facilitate consumer spending, and to reduce fraud and money laundering.…” “… More efficient, effective systems could also help lessen systemic risk & potentially provide a source of additional retail revenue for banks.…”
  • 5. Vietnam embraces the electronic era “… Vietnam is regarded by the global banking industry as one of the most fertile growth hotspots in the world, particularly for cards and electronic payments….” VRL Financial News, October 2009
  • 6. Security: The story so far… “… increased incidences of ATM and card skimming.…” “… the need to reassure cardholders about the safety and security of card transactions.…” “ Statistics from 2007 show the level of payment card fraud in Vietnam stood at 0.15 percent of total card payments, a much higher level than the global average of 0.06 percent.”
  • 7. E2EE: What is it? Computer Desktop Encyclopedia “… is defined as the continuous protection of the confidentiality and integrity of transmitted information by encrypting it at the origin and decrypting at its destination.…”
  • 8. E2EE: The story so far… Smart Card Alliance Sept 2009
  • 10. In cryptography, encryption , is the process of transforming information to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (Wikipedia) en·cryp·tion /-'krip-sh&n/
  • 11. MAC-ing is the process of “fingerprinting” data to allow any tampering to be detected, where the fingerprint is encrypted so only Sender/Receiver can form a real MAC and thus, allowing the receiver to authenticate & verify the message Message Authentication Code
  • 15. A brief look at history…
  • 16. The Line Encryption Working Group
  • 19.
  • 20. General Approaches Host-based Host HSM NAC NAC-based Host Interception-based Host NAC SNAC NAC NAC NAC NAC NAC
  • 21. Data Center Host NAC TLE: Typical Transaction Flow Terminal Encrypt selected fields in transaction 1 Send to Host 4 Decrypt & validate transaction 2 Reform to original message 3 Response from Host 5 Encrypt & MAC response 6 Decrypt & validate response message 7
  • 23. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  • 24. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  • 25. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  • 26. The Results… Source: Visa VPSS Payment Security Bulettin, 2006
  • 28. Payments: The story today… Source: BNM, 2009 Financial Stability and Payment Systems Report 2008
  • 29. Payments: The story today “… (card fraud) losses continued to be insignificant, accounting for less than 0.04% of total card transactions during the year.”
  • 32. Summary: Considerations for TLE Addresses all threats Addresses Implementation issues Addresses Deployment Issues Addresses Administration Issues Multi-channel & multi-device Support Remote Key Injection Vendor Independence Performance Cost-Effective
  • 33.
  • 35. NetMATRIX TLE (Terminal Line Encryption) is a plug-and-play solution for banks who wish to introduce terminal line encryption into their POS network infrastructure Net MATRIX Terminal Line Encryption
  • 36. NetMATRIX TLE: Approach Host-based Host HSM NAC NAC-based Host Interception-based Host NAC SNAC NAC NAC NAC NAC NAC
  • 41. Credit Card Host NII: 160 “ Typical” Transaction Flow Issuing Bank Host Acquiring Bank EDC Terminals Switching NAC Remote NAC Remote NAC Net MATRIX Acquiring Host 160 Message
  • 42. Credit Card Host NII: 160 NetMATRIX TLE NII: 161 Encrypted Transaction Flow Issuing Bank Host Net MATRIX Acquiring Bank Acquiring Host EDC Terminals Switching NAC Remote NAC Remote NAC 161 Enc Message 160 Enc Message
  • 43. Encrypted Transaction Flow II Credit Card Host NII: 160 NetMATRIX TLE NII: 161 Net MATRIX Acquiring Bank Acquiring Host Issuing Bank Host EDC Terminals Switching NAC Remote NAC Remote NAC 161 Enc Message 160 Enc Message
  • 44. Data Center Host NAC NetMATRIX: How it Works Terminal Encrypt selected fields in transaction 1 Send to Host 4 Decrypt & validate transaction 2 Reform to original message 3 Response from Host 5 Encrypt & MAC response 6 Decrypt & validate response message 7
  • 45. Efficiency: Clustering & Load-Balancing Load Balancing Host NAC TCP/IP Cluster
  • 46. Business Continuity: Auto-Failover TCP/IP Failover Host NAC TCP/IP Cluster
  • 48. Our Mission To be the leading end-to-end payment services enabler in the Asia-Pacific region, deploying world-class payment infrastructure, technology and services
  • 49. Products & Services offerings World-class payment infrastructure, services and technology: Transaction routers & concentrators Terminal Line Encryption technologies Loyalty & Online Payment solutions Smartcard technologies 24x7 Managed Network Services Consulting Services Terminal Management Solutions Contactless Payments
  • 52.
  • 53.
  • 54. Malaysia Singapore Indonesia Vietnam Brunei Customer References
  • 55. Philippines China / Hong Kong Middle East Romania Asia/Pacific Australia / New Zealand Thailand Customer References
  • 56. Thank you Alex Tan Vice President – International Sales [email_address]

Editor's Notes

  1. Mixed environment Mix of encrypting / non-encrypting terminals Different terminal vendors Different terminal capabilities Coexistence of multiple encryption schemes Deployment Issues Terminal Key Injection Phased Rollout Security Holistic treatment of Security? Procedures, Processes, technology Addresses other possible attacks? Understanding of possible attacks & risks? Terminal key storage? Performance Scalability Impact on host performance Impact on terminal performance Terminal Implementation Simplicity of terminal implementation Multi vendor implementation Impact on current infrastructure Host changes? Network & terminal changes? Stability? Robustness? Performance? Response time? Impact of future changes Changes in message formats Different message versions Shared Network Tag-on terminal applications Future requirements Multiple hosts & applications Different channels Cost Return on investment
  2. GHL’s Interception based approach Introduction to Key Features slides
  3. Does chip effectively prevent counterfeit fraud? The fraud statistics (Figure 1) for Malaysia clearly show the strong inverse relationship between increasing chip maturity and declining counterfeit fraud.
  4. Does chip effectively prevent counterfeit fraud? The fraud statistics (Figure 1) for Malaysia clearly show the strong inverse relationship between increasing chip maturity and declining counterfeit fraud.
  5. Does chip effectively prevent counterfeit fraud? The fraud statistics (Figure 1) for Malaysia clearly show the strong inverse relationship between increasing chip maturity and declining counterfeit fraud.
  6. Does chip effectively prevent counterfeit fraud? The fraud statistics (Figure 1) for Malaysia clearly show the strong inverse relationship between increasing chip maturity and declining counterfeit fraud.
  7. First & foremost, let us establish some of the facts before us…. Collection began in 2002 – contrast numbers: 20,733.5
  8. GHL’s Interception based approach Introduction to Key Features slides
  9. NetMATRIX TLE - Terminal NetMATRIX TLE comes with SDK for terminal Secure key storage for terminal Guards against terminal-to-terminal copy Local & Remote key injection capability NetMATRIX TLE – Host-side Plug N Play – Minimal change to infrastructure, no host changes 3-in-1 functionality – Digital SNAC, CNAC, TLE Form factors – Boxed solution Key Storage – HSM-based or Software-based (option) Selected-Field-Encryption (SFE), Full-Message-Encryption (FME) Multiple encryption algorithms: DES, 3DES, AES, TEA Multiple MACing algorithms: SHA-1+AES, SHA-1+RMAC Multiple key usage methodologies – unique-per-term, unique-per-txn Multiple hosts support Multiple key groups – different apps/vendors can have diff keys Multiple channels – dial-up, lease line, GPRS, GSM, broadband, etc Supports upstream & downstream encryption & MACing High-performance, high-availability, horizontal scalability (120 tps, 200 tps) ISO8583 compliant – will support any compliant NAC Utilities – Local & remote key injection utility Extensible – Can be used for other applications
  10. NAC sends transactions to NetMATRIX farm. NetMATRIX farm utilize a load-balancing service across the farm of machines, so that all these machines share the same virtual IP address. The NAC will try to establish a connection with this virtual IP address, and one of the NetMATRIX boxes will accept this connection request; thereafter, the NAC will have a persistent connection with this one box. Transactions from the NAC will subsequently be funneled through this connection and reach this primary NetMATRIX machine. The NetMATRIX box will then act to distribute these transaction messages to various other boxes in the farm for processing. Transaction load: > 120 tps = 7,200 tpm = 432,000 tphr = 10.3 million tpd = 311 million tpmonth
  11. NAC sends transactions to NetMATRIX farm. NetMATRIX farm utilize a load-balancing service across the farm of machines, so that all these machines share the same virtual IP address. The NAC will try to establish a connection with this virtual IP address, and one of the NetMATRIX boxes will accept this connection request; thereafter, the NAC will have a persistent connection with this one box. Transactions from the NAC will subsequently be funneled through this connection and reach this primary NetMATRIX machine. The NetMATRIX box will then act to distribute these transaction messages to various other boxes in the farm for processing.