Presented by David Cole

Slides:



Advertisements
Similar presentations
ORDER VERIFICATION ORDER ENTRY DAILY PROCESS ORDER VERFICATION - Order Sort Browse - Enter Order # - F-8 OK.
Advertisements

© 2007 First Data Corporation. All Rights Reserved. This document contains unpublished, confidential and proprietary information of First Data Corporation.
Government Prepaid Card
Credit Card Processing
Card Verification Support
Gareth Ellis Senior Solutions Consultant Session 5a Key and PIN Management.
Use Case & Use Case Diagram
1 U.S. EMV Migration Update and Best Practices Hap Huynh, Senior Director Risk Products April 2015.
Lecture 9 e-Banking. Introduction The most used methods to pay for a service or merchandise are: –The real money (so called “cash”) –cheque (or check.
Harvesting High Value Foreign Currency Transactions from EMV Contactless Credit Cards without the PIN 21st ACM Conference on Computer and Communications.
Access Online (AXOL).
Security in a Mobile App World - A Payments Perspective James Sellwood 6 th Sept 2014.
©2008 TTW Where “Lean” principles are considered common sense and are implemented with a passion! Product Training Credit Cards.
Mar 11, 2003Mårten Trolin1 Previous lecture Diffie-Hellman key agreement Authentication Certificates Certificate Authorities.
Credit Card And Prepaid Process Edward M. Kwang President.
BATCH TRANSACTION PROCESSING Option 1: Transaction Processing Systems.
PCI PIN Entry Device Security Requirements PCI PIN Security Standards
Session #15 The StudentLoans.gov Experience Julie Aloisio Rosa Trejo U.S. Department of Education.
PeopleSoft Time and Labor Training Instructor: Karin Alvarado
1 Access Online. 2 VERY IMPORTANT!!! To run ACCESS ONLINE – you need: Pentium 120 MHz or higher 36 MB memory64 MB recommended to run reports Windows 95,
101 P C O L S Recommended Role: New and Existing Resource Managers How to Redeem a Resource Manager Token in AIM I N T E R A C T I V E T U T O R I A L.
May 28, 2002Mårten Trolin1 Protocols for e-commerce Traditional credit cards SET SPA/UCAF 3D-Secure Temporary card numbers Direct Payments.
Secure Electronic Transaction (SET)
Use Cases 2 ENGR ♯10 Peter Andreae
R U Ready? V M E EUROPAY MASTERCARD VISA EMVco was formed in 1999.
Pharmacy Set up Bedside Medication Verification. Pharmacy Toolbox Parameters.
Introduction To Plastic Card Industry (PCI) Data Security Standards (DSS) April 28,2012 Cathy Pettis, SVP ICUL Service Corporation.
DO NOW:  Take packet:  Review the bank statement on page 3 of the packet.  In your notebook: What items does a bank statement include?
Credit Card Processing Overview. Credit Card Setup Overview  Call The Business Link ( ) Decide on Processor/Clearing House Software. Eprocess.
Access Online Cardholder Transaction Approval Training 1 Client Logo.
SFWR ENG 3KO4 Software Development for Computer/Electrical Engineering Fall 2009 Instructor: Dr. Kamran Sartipi Software Requirement Specification (SRS)
360 Control Manager & Cardholder Training Commercial Card Payment Solutions 1.
Credit Cards. 88 million American households have credit cards Average credit card debt is $9,600 per household.
How to Run a Scenario In HP LoadRunner >>>>>>>>>>>>>>>>>>>>>>
Programming with Microsoft Visual Basic th Edition
CS212: Object Oriented Analysis and Design Lecture 32: Use case and Class diagrams.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
Chapter 10: Using Menus and Validating Input Programming Logic and Design, Third Edition Comprehensive.
1 Requirements Engineering From System Goals to UML Models to Software Specifications Axel Van Lamsweerde.
EMV: transforming the payment experience
10 Chapter 101 Using Menus and Validating Input Programming Logic and Design, Second Edition, Comprehensive 10.
Use Case Diagrams. Introduction In the previous Lecture, you saw a brief review of the nine UML diagrams. Now that you have the clear, you'll start to.
* The best and easiest way to avoid budget checking errors is to view the Budgets Overview inquiry page. * Budget checking actually performs two tasks:
Salient features of facility:  Minimum amount of withdrawal Rs.100/- (thereafter in multiples of Rs.100/- ).  Maximum of Rs.1000/- per day per.
Credit Card. Basic Knowledge about Credit Card A Credit card is a plastic card that provides a cardholder electronic access to his / her bank account.
13 Copyright © 2007, Oracle. All rights reserved. Using the Data Recovery Advisor.
CREDIT CARD PAYMENT SYSTEM System involves Several major participants Purchaser that is cardholder Card Issuer that issues credit card Merchant that makes.
UC Diagram & Scenario RKPL C & D. Using Use Case Diagram Use case diagrams are used to visualize, specify, construct, and document the (intended) behavior.
Online Decision Process
EMV Operation and Attacks Tyler Moore CS7403, University of Tulsa Reading: Anderson Security Engineering, Ch (136—138), (328—343) Papers.
Mar 18, 2003Mårten Trolin1 Agenda Parts that need to be secured Card authentication Key management.
WHAT NEW, WHAT NEXT IN PAYMENT PROCESSING. EMV WHAT IS EMV? 3  An acronym created by Europay ®, MasterCard ® and Visa ®  The global standard for the.
Commercial Card Expense Reporting (CCER) The Trustees of Roanoke College An internet solution Accessed via Wells Fargo’s secure Commercial Electronic Office.
Presented by David Cole Changing the Card – Scripts.
Introduction What would our society be like now if we did not have ATm’s? Not able to access money when we urgently want it. You will have to go to the.
Presented by David Cole CVM Methods.  CVM Methods in the End-to-End Process  What is a CVM List?  Risk protection tool  Types of PIN processing 
Risk Policy Considerations.  Floor Limits  Fallback considerations  Domestic v International  Credit control (VSDC+) overview  Fraud reporting 
Terminal Risk Management
Transaction Flow end-end
PTCA Credit Card Program Overview
How to Redeem a Resource Manager Token in AIM
Problems – Technical Requirements
EMV® 3-D Secure - High Level Overview
Session 11 Other Assurance Services
Fun with Chip&PIN Denis A Nicole.
VSA Pcard Training.
Product Training Credit Cards
Chapter 10: Using Menus and Validating Input
Presentation transcript:

Presented by David Cole Card Risk Management Presented by David Cole

Chip End-to-End process AUTHORISATIONS Offline PIN Validation Card holder verification method Terminal Risk Management iCVV checking Card Risk Management ATC checking ISSUER HOST Online CAM Online PIN Script processing

Chip issuer decisions Magnetic stripe Issuer decisions At the POS – Minimal Card provides service code and account information. Terminal processes accordingly At Visa Stand In Processing (STIP) decisions plus CVV checking At Issuer host Authorisations decisions based on transaction processing (e.g. successful CVV) plus risk processing (e.g. available credit, account status, previous transactional data) Card Risk Management

Chip issuer decisions Chip Issuer decisions At the POS – Substantially more than magnetic stripe Card is interactive. Contains card risk parameters Card is able to make decisions at POS based on Issuer’s choice At Visa Additional Chip Stand In Processing (STIP) decisions At Issuer host New authorisations data available to the Issuer based on chip transaction processing Ability to change the card’s chip parameters and status Card Risk Management

Chip issuer decisions Chip card risk parameters Set at card level as part of personalisation Parameter is set to: Decline if triggered (Denial) Go Online if triggered (Online) Decline or Approve if unable to go online (Default) Called Issuer Action Codes (IAC’s) Combination of: Transaction errors (e.g. PIN failed) Domestic and International counters (e.g. offline spend) Traditional triggers (e.g. Floor limit exceeded) Card Risk Management

Card action analysis Terminal Request to the card Card Risk Management Can this transaction proceed? Record events so far Have any exceptions been triggered such as PIN failed, counters exceeded? Record ‘position statement’ in the Card Verification Result (CVR) Apply actions provided by the Issuer (IAC’s) Apply Issuer Action Codes Provide a response to the terminal (Online, Decline, Approve) Card Risk Management

Card Verification results (CVR) Card action analysis Card Action Analysis Counter checks Previous Txn checks Domestic LCOL Not completed Decision Int’l LCOL Issuer script failed Domestic currency Offline spend SDA failed DDA failed 2nd currency Offline spend New Card PIN exceeded Card Verification results (CVR) Card Risk Management

Card action analysis Terminal Card can respond with requests Decline Online Decline Online Approve Decline Online Approve Card Risk Management

Card action analysis Visa Recommendations See Visa Perso Templates Condition Response   IAC Denial - decline offline IAC Online - go online IAC Default - decline offline if unable to go online Offline Data Authentication Not performed 1 Offline Static Data Authentication Failure Chip Data Missing Primary Account Number on terminal exception file Offline Dynamic Data Authentication Failure Combined DDA/AC Generation failure Chip and terminal are different versions Expired Application Application not active (effective date check) Service not allowed for card product New Card Cardholder verification failed CVM not recognized PIN try limit exceeded Visa Recommendations See Visa Perso Templates Card Risk Management

Card action analysis Card Risk Management Condition Response   IAC Denial - decline offline IAC Online - go online IAC Default - decline offline if unable to go online PIN entry required and PIN pad not working or not present 1 PIN entry required, PIN pad working but no PIN entered Online PIN entered Reserved for future use 00 Transaction exceeds floor limit Lower offline limit exceeded Upper offline limit exceeded Transaction selected randomly for online transmission: Merchant forced transaction online Issuer Authentication Failed Script processing failed prior to generating final cryptogram Script processing failed after generating final cryptogram Card Risk Management

Card action analysis Value of Total Consecutive Offline Spend Limit and what to do if unable to go online International offline counters Value of Lower Consecutive Offline Limit Value of Upper Consecutive Offline Limit Value of PIN try limit 2nd Currency values Card Risk Management

Card action analysis Card provides terminal with one of the following: A decline message containing an end of transaction certificate for audit purposes. Called an AAC (Application Authentication Cryptogram) An approval message containing an end of transaction certificate for audit purposes. Called a TC (Transaction Certificate) An online message request containing an online cryptogram message that can be validated by the Issuer. Called an ARQC (Authorisation ReQuest Cryptogram) Card Risk Management

Summary Traditionally, terminals execute risk management at the POS Now the card has a major impact in the POS decision process Cards need to be personalised with Issuer Action Codes (IAC’s) Card decisions should not be made in isolation of the host decisions as they are linked The terminal will request a Decline, Go Online or Approve. The card: Must agree with a decline request Cannot overturn an online request with an approval Can choose the outcome of a transaction if the terminal is happy to approve Lets assume an online request and see what Risk tools are available when we go online Card Risk Management

Importance of Issuer Action Codes (IACs) The Issuer Action Codes are a list of up to 37 conditions that if they occur the card then decides what it will do: Authorise offline Go online Decline An example is. Is this the first transaction on a new card. If so Go Online and if you cant go online decline