Rechercher
Contactez-nous Suivez-nous sur Twitter En francais English Language
 











Freely subscribe to our NEWSLETTER

Newsletter FR

Newsletter EN

Vulnérabilités

Unsubscribe

Combatting Card-Not-Present fraud and Secure Customer Authentication

January 2019 by David Orme, Senior Vice President at IDEX Biometrics

A ‘Card-Not-Present’ transaction is when a payment is made without a cardholder physically presenting their card to the merchant. Historically these sorts of payments have been used effectively for mail and telephone orders, but now they are used more typically to complete online orders, such as e-commerce and m-commerce (In App[1]).

However, Card-Not-Present transactions are the biggest routes to card fraud, as this form of payment presents a specific challenge to retailers in being able to verify who the actual cardholder is, and consequently being able to authenticate their payment effectively.

The introduction of EMV (Europay, Mastercard and Visa standards) chip and pin brought enhanced authentication and cardholder verification for payment cards, which enabled a decline in Card-Present fraud. As a result, fraudsters have migrated to Card-Not-Present routes of attack, particularly for e-commerce and m-commerce transactions.

Why current methods of online authentication aren’t working

The main online method of authentication consumers must complete, depending on the retailer, is 3D Secure, which stands for 3 Domain Server, there are three parties that are involved in the 3D Secure process[2]:
• The merchant the purchase is being made from
• The acquiring bank (the bank of the company)
• The card issuer (such as VISA and MasterCard)

The 3D Secure form of authentication is an additional fraud prevention scheme that the majority of retailers use via their chosen Payment Service Provider (PSP). The method allows shoppers to create a password for each of their payment cards, which is used to authenticate an online transaction through a site that requires the 3D scheme.

3D Secure is also the only fraud prevention scheme available that offers companies liability cover for transactions that are verified by the checks. This provides additional protection to companies using the scheme as opposed to those that do not.

However, the scheme is not completely fool proof. Banks and retailers trialled 3DS (3-domain secure), also known as Payer Authentication, for online transactions, which was successful in the UK from 2008 to 2011. However, the success was short-lived due to the lack of 3DS adoption by consumers, as consumers looked for ways to circumnavigate the authentication process in favour of convenience, which also created opportunities for fraudsters.

With the introduction of the regulatory technical standards on Strong Customer Authentication by the EU in September next year, under the Second Payment Services Directive (PSD2), merchants must require two methods of authentication. These two methods must be chosen from the following authentication methods: Something you know/knowledge (PIN or password), something you have/possess (bank issued card reader) and something you are/inherence (biometric). Many retailers already require the first option; however, the last two factors have proven difficult for merchants to address.

What to consider when developing a Strong Customer Authentication strategy?

Knowledge covers the most widely used methods of payment authentication, such as PINs and passwords, however many banks also encourage a secret question, such as ‘what’s your mother’s maiden name?’ or ‘your first pet’s name’. Possession covers proving that you physically have the card on you, methods such as One Time Passwords (OTP) issued via SMS or inputting your card into a bank issued card reader.

However, personal card readers to provide OTPs can be expensive for banks to issue and extremely inconvenient for consumers to repeatedly use.

The secret piece of the puzzle to balancing security versus convenience lies in the use of analytics and fingerprint biometrics via smartphones. Most smart phones on the market now include integrated fingerprint biometric readers, so it makes sense that retailers and banks leverage this ability to make online, and particularly m-commerce, transactions more secure. However, we face another challenge - in this use case biometric data managed through the smartphone provider, as opposed to the card owner.

Smart Payment Cards with fingerprint biometric sensors are in mass production and due to hit the market in 2019, putting payment security firmly in the hands of the consumer. The level of technology that has been developed behind a biometric sensor makes it very straightforward for the user to record their fingerprint; the reference fingerprint can easily be uploaded to the card by the user, at home, and once it is done the card can be used over existing secure payment infrastructures — including both chip and ID and contactless card readers — in the usual way.

Once it is registered the fingerprint is held only on the card and not on a central bank database, removing the attractive honey pot of biometric fingerprint data for hackers. By also storing the biometric fingerprint data directly on the card itself, it also makes it impossible for casual pick pocketers to use stolen contactless cards.

Retailers and bankers both stand to benefit from the perfect balance of convenience and security created by connecting biometric fingerprint enabled smart cards and the Near Field Communications (NFC) ability of the card direct to the smart phone for online transactions.

Further possibilities to strengthen retailers’ and merchants’ compliance, would be to add digital dynamic CVV number and Primary Account Number (PAN) tokenisation. This would essentially replace the printed CVV number currently on the reverse of all cards with a digital display that presents a new code whenever the card owner’s fingerprint is presented on the card and the PAN with a token. This means that both changing numbers are never exposed to the payments ecosystem, other than to the card issuer, which is standard practise. In turn, the traditional payment card as we know it would be transformed and protect against the theft of static card numbers for fraudulent online transactions and physical card theft in the same breath. This would inherently meet the SCA requirements for online transaction authentication, with an OTP covering knowledge and biometrics covering the inherence requirement. However, this would work with any other method of authentication to accompany biometrics to go above and beyond meeting the SCA regulation. This is an opportunity presented to banks, retailers and customers alike to embrace the most secure and convenient methods of authentication to tackle Card-Not-Present fraud once and for all.


[1] InApp - In-App purchasing refers to the buying of goods and services from inside an application on a mobile device, such as a smartphone or tablet. In-app purchases allow developers to provide their application for free. The developer then advertises upgrades to the paid version, paid feature unlocks, special items for sale or even ads other apps and services to anyone who downloads the free version. This allows the developer to profit despite giving the basic app itself away for free.


See previous articles

    

See next articles












Your podcast Here

New, you can have your Podcast here. Contact us for more information ask:
Marc Brami
Phone: +33 1 40 92 05 55
Mail: ipsimp@free.fr

All new podcasts