SlideShare a Scribd company logo
1 of 10
Geoff Krieg
VP of Product Management, Merchant Link
A Flexible, Layered Approach
               to Security
• Acquirer Neutral – Enable merchants
  and franchisees to process via
  the acquirer they prefer
• Encryption Options – Leverage
  multiple point of interaction (POI)
  devices that can protect both
  keyed and swiped data
• Tokenization Options – Support both
  single and multi-use tokens
• Freedom to Change - Allow merchants to switch
  processors easily, without replacing tokenization
  system or encryption devices
Encryption-at-Swipe
• OBJECTIVE: Data field encryption should be
  implemented at, or as close to card swipe or data
  entry as possible – ideally within the device’s read
  head or tamper resistant security module (TRSM)
• REQUIREMENT: Merchant is removed from all key
  management responsibilities and has no access to
  decryption keys or the decryption process
Encryption Vendor Selection
• Industry Standard Vendor (no licensing fees)
    – DUKPT 3DES encryption (AES forthcoming)
    – Every transaction receives a new key
    – Encryption occurs within read head
• Proprietary Technology Vendor
    – Identity-based encryption eliminates
      need for secure injection room
    – Works on leading terminals, PIN pads,
      wedge, mobile devices
    – Supports browser-based page embedded
      encryption for secure eCommerce

Both support EMV devices and encrypt manually entered cards
HSMs located in Merchant Link’s data centers
Tokenization for Lodging
• Folio Consolidation
   – Merge all guest transactions
     (room, dining, spa services,
     gift shop purchases, etc.)
     to one folio/card number
• Guest Satisfaction
   – Preferences associated with
     the profile can flow to the      • Operations
     reservation and tie to the          – Requires less
     same token                            database storage
• Loyalty / Marketing                    – Streamlines
   – Even if the guest has multiple        accounting and
     stays (at multiple hotel              audit functions
     locations with a chain)
     the token remains the same
Multi-Use Token Design
• Length: 16 digits to easily replace card
  numbers in existing systems
• Format: Last 4 digits of the token
  are the last 4 digits of the card
  number to work seamlessly
  with most PMS applications
• Mod-10: Customizable - can be set
  to pass or not pass mod-10 validation
• Expiration: Tokens will not expire – the token remains the
  same for a card that has been reissued with a new expiration
  date (within a particular chain/organization)
• Token ≠ Valid Card #: Tokens should not be mistaken for
  legitimate payment card numbers
• Token Boundaries: Only work within specific property/chain
Design Considerations
• Bulk Tokenization/Conversion at Implementation
   – Automated utility converts all credit card numbers
     (historic, current and future)
• Added Security w/Client Certificates
   – Helps interrogate which terminals are allowed to
     communicate with the vault
• Tokens Used For...
   – Incremental and reversal
     authorizations
   – No show transactions
   – Refunds
Securing Payments in Lodging
Before You Buy, Consider …
Scope – What Impact will my
 decision have on PCI Scope?
Form – Single or Multi-Use
 Tokens? Format Preserving?
 What are my use cases?
Function – Follow-on
 Transactions? Manual Entry?
 Offline?
Logistics – Deployment and
 Replacement Considerations?
Flexibility – Future Options?
 Hardware Provider? Processor?
Other Considerations
Service / Support
• Fast access to data and ability to troubleshoot
• Responsive, redundant support centers available 24x7x365

Network Reliability / Financial Strength
• Examine network uptime and throughput
     – Redundant data centers?
     – Transactions per second?
• Examine stability and strength
  of company

Flexibility
•   Encryption via various POI devices
•   Single vs. multi-use tokens
•   Processor choice
•   POS vendor/device choice

More Related Content

What's hot

E commerce
E commerceE commerce
E commercejoyiapk
 
Inlib 24 hrs self service library xc-bm603-2
Inlib 24 hrs self service library   xc-bm603-2Inlib 24 hrs self service library   xc-bm603-2
Inlib 24 hrs self service library xc-bm603-2TG Ler, MBA
 
Digital kiosk - On Premise Remote Live Digital Agent
Digital kiosk - On Premise Remote Live Digital AgentDigital kiosk - On Premise Remote Live Digital Agent
Digital kiosk - On Premise Remote Live Digital AgentVeriShow
 
truMe for wellness centres
truMe for wellness centrestruMe for wellness centres
truMe for wellness centresAthulJojo1
 
Visitor management system for government buildings
Visitor management system for government buildingsVisitor management system for government buildings
Visitor management system for government buildingsAthulJojo1
 
Selling SaaS in a product world
Selling SaaS in a product worldSelling SaaS in a product world
Selling SaaS in a product worldSVPMA
 
TourPlus - Amusement Park / FEC Software
TourPlus - Amusement Park / FEC SoftwareTourPlus - Amusement Park / FEC Software
TourPlus - Amusement Park / FEC SoftwareGautam Ganguly
 

What's hot (10)

E commerce
E commerceE commerce
E commerce
 
Inlib 24 hrs self service library xc-bm603-2
Inlib 24 hrs self service library   xc-bm603-2Inlib 24 hrs self service library   xc-bm603-2
Inlib 24 hrs self service library xc-bm603-2
 
Digital kiosk - On Premise Remote Live Digital Agent
Digital kiosk - On Premise Remote Live Digital AgentDigital kiosk - On Premise Remote Live Digital Agent
Digital kiosk - On Premise Remote Live Digital Agent
 
Departmental stores
Departmental storesDepartmental stores
Departmental stores
 
HRMS Software in India
HRMS Software in IndiaHRMS Software in India
HRMS Software in India
 
truMe for wellness centres
truMe for wellness centrestruMe for wellness centres
truMe for wellness centres
 
Visitor management system for government buildings
Visitor management system for government buildingsVisitor management system for government buildings
Visitor management system for government buildings
 
Selling SaaS in a product world
Selling SaaS in a product worldSelling SaaS in a product world
Selling SaaS in a product world
 
Notifs 2018
Notifs 2018Notifs 2018
Notifs 2018
 
TourPlus - Amusement Park / FEC Software
TourPlus - Amusement Park / FEC SoftwareTourPlus - Amusement Park / FEC Software
TourPlus - Amusement Park / FEC Software
 

Viewers also liked

Dets 12 globaalse majanduse kasv kiirenes ka detsembris
Dets 12 globaalse majanduse kasv kiirenes ka detsembrisDets 12 globaalse majanduse kasv kiirenes ka detsembris
Dets 12 globaalse majanduse kasv kiirenes ka detsembrisKristjan Eljand
 
Amca winter 2012
Amca winter 2012Amca winter 2012
Amca winter 2012AMCABoard
 
Getting Started with Merchant Link
Getting Started with Merchant LinkGetting Started with Merchant Link
Getting Started with Merchant LinkMerchant Link
 
Riigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriisRiigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriisKristjan Eljand
 
Copyright and Fair Use
Copyright and Fair UseCopyright and Fair Use
Copyright and Fair Usedrfmashley
 
Point-to-Point Encryption: Best Practices and PCI Compliance Update
Point-to-Point Encryption: Best Practices and PCI Compliance UpdatePoint-to-Point Encryption: Best Practices and PCI Compliance Update
Point-to-Point Encryption: Best Practices and PCI Compliance UpdateMerchant Link
 
Ridge Augmentation for Ovate Pontics
Ridge Augmentation for Ovate PonticsRidge Augmentation for Ovate Pontics
Ridge Augmentation for Ovate Ponticsombaghele
 
CPITN survey at Solapur district
CPITN survey at Solapur districtCPITN survey at Solapur district
CPITN survey at Solapur districtombaghele
 
Gum disease: A silent killer
Gum disease: A silent killerGum disease: A silent killer
Gum disease: A silent killerombaghele
 
CPITN survey at Kolhapur district
CPITN survey at Kolhapur districtCPITN survey at Kolhapur district
CPITN survey at Kolhapur districtombaghele
 
AMCA Info 2014
AMCA Info 2014AMCA Info 2014
AMCA Info 2014AMCABoard
 
CPITN survey at Nagpur district
CPITN survey at Nagpur districtCPITN survey at Nagpur district
CPITN survey at Nagpur districtombaghele
 
Ridge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeriesRidge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeriesombaghele
 
Embriología faringe laringe
Embriología faringe laringeEmbriología faringe laringe
Embriología faringe laringeAdriana Furlong
 

Viewers also liked (14)

Dets 12 globaalse majanduse kasv kiirenes ka detsembris
Dets 12 globaalse majanduse kasv kiirenes ka detsembrisDets 12 globaalse majanduse kasv kiirenes ka detsembris
Dets 12 globaalse majanduse kasv kiirenes ka detsembris
 
Amca winter 2012
Amca winter 2012Amca winter 2012
Amca winter 2012
 
Getting Started with Merchant Link
Getting Started with Merchant LinkGetting Started with Merchant Link
Getting Started with Merchant Link
 
Riigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriisRiigieelarve ja euroopa võlakriis
Riigieelarve ja euroopa võlakriis
 
Copyright and Fair Use
Copyright and Fair UseCopyright and Fair Use
Copyright and Fair Use
 
Point-to-Point Encryption: Best Practices and PCI Compliance Update
Point-to-Point Encryption: Best Practices and PCI Compliance UpdatePoint-to-Point Encryption: Best Practices and PCI Compliance Update
Point-to-Point Encryption: Best Practices and PCI Compliance Update
 
Ridge Augmentation for Ovate Pontics
Ridge Augmentation for Ovate PonticsRidge Augmentation for Ovate Pontics
Ridge Augmentation for Ovate Pontics
 
CPITN survey at Solapur district
CPITN survey at Solapur districtCPITN survey at Solapur district
CPITN survey at Solapur district
 
Gum disease: A silent killer
Gum disease: A silent killerGum disease: A silent killer
Gum disease: A silent killer
 
CPITN survey at Kolhapur district
CPITN survey at Kolhapur districtCPITN survey at Kolhapur district
CPITN survey at Kolhapur district
 
AMCA Info 2014
AMCA Info 2014AMCA Info 2014
AMCA Info 2014
 
CPITN survey at Nagpur district
CPITN survey at Nagpur districtCPITN survey at Nagpur district
CPITN survey at Nagpur district
 
Ridge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeriesRidge Augmentation for Ovate Pontics- multiple surgeries
Ridge Augmentation for Ovate Pontics- multiple surgeries
 
Embriología faringe laringe
Embriología faringe laringeEmbriología faringe laringe
Embriología faringe laringe
 

Similar to HITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and Friends

#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security modelMicro Focus
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEGreg Stone
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryNarudom Roongsiriwong, CISSP
 
In Store Self Service Solution
In Store Self Service SolutionIn Store Self Service Solution
In Store Self Service Solutionzsacranie
 
Futurex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonFuturex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonGreg Stone
 
Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?Zach Gardner
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataPrecisely
 
Tokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data StorageTokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data Storage- Mark - Fullbright
 
Areas of Risk for Data Security and Privacy within Hospitality Industry
Areas of Risk for Data Security and Privacy within Hospitality Industry  Areas of Risk for Data Security and Privacy within Hospitality Industry
Areas of Risk for Data Security and Privacy within Hospitality Industry Goose & Gander
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)TokenEx
 
Vaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryVaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryJohan Dentant
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction pptSubhash Gupta
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserverMicro Focus
 
Polling system solution using blockchain & Liferay
Polling system solution using blockchain & LiferayPolling system solution using blockchain & Liferay
Polling system solution using blockchain & LiferayDhanraj Dadhich
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.NextMark Diodati
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systemsVishal Singh
 

Similar to HITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and Friends (20)

#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model#MFSummit2016 Secure: Mind the gap strengthening the information security model
#MFSummit2016 Secure: Mind the gap strengthening the information security model
 
Understanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PEUnderstanding the Role of Hardware Data Encryption in EMV and P2PE
Understanding the Role of Hardware Data Encryption in EMV and P2PE
 
Embedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment IndustryEmbedded System Security: Learning from Banking and Payment Industry
Embedded System Security: Learning from Banking and Payment Industry
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
In Store Self Service Solution
In Store Self Service SolutionIn Store Self Service Solution
In Store Self Service Solution
 
Futurex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, BostonFuturex Slides at ACI Exchange 2013, Boston
Futurex Slides at ACI Exchange 2013, Boston
 
Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?Encryption and Tokenization: Friend or Foe?
Encryption and Tokenization: Friend or Foe?
 
Key Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i DataKey Concepts for Protecting the Privacy of IBM i Data
Key Concepts for Protecting the Privacy of IBM i Data
 
System 6000
System 6000System 6000
System 6000
 
Authentication Management
Authentication ManagementAuthentication Management
Authentication Management
 
Tokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data StorageTokenization Payment Data Out Securing Payment Data Storage
Tokenization Payment Data Out Securing Payment Data Storage
 
Areas of Risk for Data Security and Privacy within Hospitality Industry
Areas of Risk for Data Security and Privacy within Hospitality Industry  Areas of Risk for Data Security and Privacy within Hospitality Industry
Areas of Risk for Data Security and Privacy within Hospitality Industry
 
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
PCI Scope Reduction Using Tokenization for Security Assessors (QSA, ISA)
 
Vaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_IndustryVaultless_Tokenization_Payments_Industry
Vaultless_Tokenization_Payments_Industry
 
Secure electronic transaction ppt
Secure electronic transaction pptSecure electronic transaction ppt
Secure electronic transaction ppt
 
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
#MFSummit2016 Secure: Is your mainframe less secure than your fileserver
 
Polling system solution using blockchain & Liferay
Polling system solution using blockchain & LiferayPolling system solution using blockchain & Liferay
Polling system solution using blockchain & Liferay
 
Authentication.Next
Authentication.NextAuthentication.Next
Authentication.Next
 
The electronic payment systems
The electronic payment systemsThe electronic payment systems
The electronic payment systems
 
Secure electronic transaction (set)
Secure electronic transaction (set)Secure electronic transaction (set)
Secure electronic transaction (set)
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

HITEC 2012: Hard Codes to Crack: Tokenization, Encryption-at-Swipe and Friends

  • 1. Geoff Krieg VP of Product Management, Merchant Link
  • 2. A Flexible, Layered Approach to Security • Acquirer Neutral – Enable merchants and franchisees to process via the acquirer they prefer • Encryption Options – Leverage multiple point of interaction (POI) devices that can protect both keyed and swiped data • Tokenization Options – Support both single and multi-use tokens • Freedom to Change - Allow merchants to switch processors easily, without replacing tokenization system or encryption devices
  • 3. Encryption-at-Swipe • OBJECTIVE: Data field encryption should be implemented at, or as close to card swipe or data entry as possible – ideally within the device’s read head or tamper resistant security module (TRSM) • REQUIREMENT: Merchant is removed from all key management responsibilities and has no access to decryption keys or the decryption process
  • 4. Encryption Vendor Selection • Industry Standard Vendor (no licensing fees) – DUKPT 3DES encryption (AES forthcoming) – Every transaction receives a new key – Encryption occurs within read head • Proprietary Technology Vendor – Identity-based encryption eliminates need for secure injection room – Works on leading terminals, PIN pads, wedge, mobile devices – Supports browser-based page embedded encryption for secure eCommerce Both support EMV devices and encrypt manually entered cards HSMs located in Merchant Link’s data centers
  • 5. Tokenization for Lodging • Folio Consolidation – Merge all guest transactions (room, dining, spa services, gift shop purchases, etc.) to one folio/card number • Guest Satisfaction – Preferences associated with the profile can flow to the • Operations reservation and tie to the – Requires less same token database storage • Loyalty / Marketing – Streamlines – Even if the guest has multiple accounting and stays (at multiple hotel audit functions locations with a chain) the token remains the same
  • 6. Multi-Use Token Design • Length: 16 digits to easily replace card numbers in existing systems • Format: Last 4 digits of the token are the last 4 digits of the card number to work seamlessly with most PMS applications • Mod-10: Customizable - can be set to pass or not pass mod-10 validation • Expiration: Tokens will not expire – the token remains the same for a card that has been reissued with a new expiration date (within a particular chain/organization) • Token ≠ Valid Card #: Tokens should not be mistaken for legitimate payment card numbers • Token Boundaries: Only work within specific property/chain
  • 7. Design Considerations • Bulk Tokenization/Conversion at Implementation – Automated utility converts all credit card numbers (historic, current and future) • Added Security w/Client Certificates – Helps interrogate which terminals are allowed to communicate with the vault • Tokens Used For... – Incremental and reversal authorizations – No show transactions – Refunds
  • 9. Before You Buy, Consider … Scope – What Impact will my decision have on PCI Scope? Form – Single or Multi-Use Tokens? Format Preserving? What are my use cases? Function – Follow-on Transactions? Manual Entry? Offline? Logistics – Deployment and Replacement Considerations? Flexibility – Future Options? Hardware Provider? Processor?
  • 10. Other Considerations Service / Support • Fast access to data and ability to troubleshoot • Responsive, redundant support centers available 24x7x365 Network Reliability / Financial Strength • Examine network uptime and throughput – Redundant data centers? – Transactions per second? • Examine stability and strength of company Flexibility • Encryption via various POI devices • Single vs. multi-use tokens • Processor choice • POS vendor/device choice

Editor's Notes

  1. Security experts along with the PCI Council agree, a layered approach to security is best, as there is no one technology that will make you secure or PCI compliant.Encryption and tokenization work together to protect both data in transit and data at rest.
  2. According to Verizon’s 2012 Data Breach Investigations Report, the most common external breach techniques utilize a combination of hacking and malware (61%). Along the same lines, Trustwave reported that hackers are having a far greater degree of success stealing data “in transit” (62.5%) versus stored data (28%) in their 2012 Global Security Report.Merchant Link’s objective, well before PCI published its P2PE solution requirements, was to completely remove merchants from key management and the decryption process.
  3. When looking at options to protect data in-flight, we chose not to reinvent the wheel but rather to partner with industry leading vendors.Our aim is to provide the most secureand flexible point-to-point encryption solution in the marketplace today.Our goal is to support various points of interaction POI with interfaces to different hardware vendors to offer merchants as much choice as possible.Unlike processor-based encryption, oursolution allows merchants to switch processors easily and without changing tokenization or encryption methodologies.DUKPT = Derived Unique Key Per Transaction =a key management technique in which for every transaction, a unique key is used which is derived from a fixed key. Therefore, if a derived key is compromised, future and past transaction data are still protected since the next or prior keys cannot be determined easily.
  4. Hoteliersfind a great deal of value in multi-use tokens.
  5. Other key aspects we considered when designing into our tokenization solution:Bulk Tokenization / Conversion at Implementation: Merchant Link provides a bulk Get Token only transaction to speedily convert many card numbers to tokens during tokenization installation. Many currently operational hotels have future reservations, current guests, and X number of past historical credit cards that they want to retain and turn into tokens. Added Security w/Client Certificates: Merchant Link deploys client certificates to further secure the communication between the hotelier’s systems and our data vault. Client certificates help interrogate which terminals are allowed to communicate with the vault.Tokens Used For...Incremental and reversal authorizationsNo show transactionsRefunds
  6. Scope:Am I aligned with industry best practices? What will my QSA say? Have I addressed manual entry? Gift Cards? Private Label?Form:Single Use or Multi-Use? What are the use cases?Function: Does my tokenization solution support follow on transactions, especially no show charging? Do your systems have a reservationthat tokenizes for multiple hotelsand is there a need to share tokensbetween hotels PMS or a reservation system?Do I have systems that allowcustomers to post a card number to a loyalty membership? Does it make sense if a husband and wife have two loyalty memberships to have different tokens if it’s the same credit card number? Logistics:How many devices to I need to obtain? What happens if the encrypting device fails? How long is the injection/shipment/delivery process for a new device?General Have I identified all the use cases ofhow credit cards interact with mysystems?Do I have the IT personnel tosupport the technology I’m goingto deploy?EncryptionIs POI a tamper-resistantdevice? Solution should be alignedwith industry best security practices for data field encryptionHow many devices to I need to obtain? What happens if the encrypting device fails? How long is the injection/shipment/delivery process for a new device?How does the encrypting device handle non-payment cards? (gift cards, membership cards, employee sign in cards, etc…) Should I buy encrypting devices that are EMV and contactless-capable?Do I need a solution that supports multiple hardware vendors?TokenizationHow much historical data do I really need to keep? (We recommend you purge as much unneeded data as possible.)Do my systems and applications that consume credit cards require mod 10 passable cards or not?Do I have systems that would benefit from having a consistent token to perform customer tracking and purchase behavior/history?Do I have systems that allowcustomers to post a card number toa loyalty membership?Do your systems have a reservationthat tokenizes for multiple hotelsand is there a need to share tokensbetween hotels PMS or a reservation system?Does my tokenization solution support follow on transactions, including no show charges?
  7. A few other things to keep in mind...Implementing these technologies will further distance you from the actual credit card numbers – which is a good thing for security and compliance – but it means is that having high-touch service and support is more important. Make sure your provider has support that is responsive, available 24x7x365, that can help you track down and immediately resolve problems. Second, take a look at the company’s network reliability and financial strength.And finally, in today’s payments landscape where security threats and payment methods are constantly evolving, I would encourage you to invest in solutions that offer multiple options and flexibility in terms of the devices, points of interaction (POI) and processors supported.