Presentation is loading. Please wait.

Presentation is loading. Please wait.

Copyright 2009, First Data Corporation. All Rights Reserved. How Does TransArmor SM Work at the POS? SafeProxy Merchant Anti FraudAnalytics First Data.

Similar presentations


Presentation on theme: "Copyright 2009, First Data Corporation. All Rights Reserved. How Does TransArmor SM Work at the POS? SafeProxy Merchant Anti FraudAnalytics First Data."— Presentation transcript:

1 Copyright 2009, First Data Corporation. All Rights Reserved. How Does TransArmor SM Work at the POS? SafeProxy Merchant Anti FraudAnalytics First Data Switch Issuer Transaction Log Settlement Data Warehouse 1 2 3 4 4 6 66 6 First Data Datacenter 5 PKI Encryption Financial Token Merchant Environment 1. Credit Card is swiped at the merchant’s POS 2. PAN/Track data/exp dates encrypted using a Public Key in the POS device and sent to First Data 3. Encrypted Transaction is Decrypted using Private Key in First Data’s HSM 4. Card number is passed to bank for authorization and SafeProxy server for tokenization 5. Authorization and token are returned to the merchant 6. Token is stored in place of the card number in all places 7. Adjustments, refunds, ‘Card not present’, and settlement use the token in place of the card number

2 Copyright 2009, First Data Corporation. All Rights Reserved. How Does TransArmor SM Work with CNP? SafeProxy Anti FraudAnalytics First Data Switch Issuer Transaction Log Settlement Data Warehouse 2 3 4 4 6 66 6 First Data Datacenter 5 PKI Encryption Financial Token Merchant Environment 1. Credit Card is keyed into payment page/IVR. If e-Wallet technology is used, a Consumer Token can be used to initiate a new transaction 2. PAN/Track data/exp dates encrypted using a Public Key in the Web Server / ERP / CRM system and sent to First Data 3. Encrypted Transaction is Decrypted using Private Key in First Data’s HSM 4. Card number is passed to bank for authorization and SafeProxy server for tokenization 5. Authorization and token are returned to the merchant 6. Token is stored in place of the card number in all places 7. Adjustments, refunds, ‘Card not present’, and settlement use the token in place of the card number Web Server ERP / CRM / Etc. Consumer Token for e-Wallet 1 1 Consumer SSL Encryption

3 Copyright 2009, First Data Corporation. All Rights Reserved. First Data ® TransArmor SM Technologies Leveraged Two-level approach to protecting data at every point Public/Private Key encryption (Asymmetric) –Data encrypted at capture with Public Key and can only be decrypted by the Private Key held by First Data –Encryption is only used to protect PAN during transit or offline situations Tokenization –Replacement of PAN with a random number (Token) - no key to “crack” or steal –Token uses the same number format as the card data - last 4 digits of PAN are retained in the token –1:1 Mapping of token to a PAN - the same card always returns the same token –Token replaces the card data in the merchants system

4 Copyright 2009, First Data Corporation. All Rights Reserved. Benefits The First Data ® TransArmor SM solution removes sensitive payment card data from Merchants systems Key Benefits Risk Reduction Increases security of payment card transactions protecting your brand reputation & revenue stream Less complex and more secure than encryption alone Warrants against a compromise on the Token Cost Savings Significantly reduces PCI remediation timelines (up to 50%) Significantly reduces PCI compliance scope (up to 80%) Operational cost that scales with consumption vs. large, recurrent capital outlays Business Continuity Hardware, card association and merchant acquirer agnostic Integrates with VARs and Third Party solutions Enables continued analytics and reporting capabilities Enables cloud computing scenarios


Download ppt "Copyright 2009, First Data Corporation. All Rights Reserved. How Does TransArmor SM Work at the POS? SafeProxy Merchant Anti FraudAnalytics First Data."

Similar presentations


Ads by Google