GUANGZHOU INCODE MARKING TECHNOLOGY CO., LTD.

Home> Blog> Thoughts on Promoting Payment Marking Scheme in Bank Card Industry

Thoughts on Promoting Payment Marking Scheme in Bank Card Industry

June 28, 2022

Tokenization is not a new vocabulary. In 2010, VISA and PCI successively released best practice guides for tokenizing data in accounts. Because of its closed application in the industry, it can be said to be “not ignorant”, but with the rapid payment of innovation Development, tokenization has once again become the focus of the industry. EMVCo launched the Payment Tokenization framework in March 2014 to promote the application and promotion of payment markers by developing globally accepted standards. This article will start with the problem, basic framework and application scenarios solved by the payment mark, and share with the reader through the analysis of related content.

I. Overview

Taking into account security and credibility and user convenience is a unique feature of the payment industry, and innovation cannot be abandoned at the same time. "Tokenization" can be rapidly developed and applied precisely because it solves sensitive information protection problems and completely transparent to users, making it easier for users to accept and use. To avoid confusion, "Tokenization" is defined as tokenization in conjunction with the actual application and working mechanism of the specification. There are two potential weaknesses to implementing data protection using traditional forms of encryption: the reversibility of encryption results and the complexity of key management. Different from the encryption scheme, tokenization is to protect sensitive information in the form of data substitution. Not only can an attacker not obtain the original data through reversible methods, but the format and structure of the substitute value can be exactly the same as the original data. To reduce the impact on business and applications.

Second, the potential weakness of the existing encryption method

Ensuring the legality of a transaction requires three levels of certification steps, one is the cardholder's certification (ensuring that the cardholder is the person), the second is card authentication (preventing the fake card), and the third is the legal voucher for the transaction (preventing Transaction refusal). But regardless of the type of transaction, the card number-based payment system, the delivery and storage of the card number still provides room for transaction fraud:

(1) Face-to-face card transactions

Due to the characteristics of magnetic stripe cards being easily copied and unauthenticated, risk events such as transaction fraud and card side recording seriously affect the normal use of bank cards. The EMV standard realizes the dynamic authentication of cards and terminals by developing a global security framework for chip cards and terminals, ensuring the security of the acceptance process; however, after the authentication, the subsequent transaction links still do not effectively protect the account sensitive information, such as :

· In the authorization, the request data is sent by the terminal to the acquiring institution or the issuing bank.

· Authorization data is sent to the recycling agency or merchant system

(2) Online cardless transactions

Innovative payment based on the Internet ecology brings convenience and convenience to users, but most of the innovative payment is basically through the card number and the corresponding sensitive information (validity period, CV2) to complete the transaction authentication. The risks are mainly reflected in:

· How to ensure that users connect to legitimate businesses

· How to verify legally authorized users

· How to send card data to merchants through a secure channel

· How to ensure the secure transmission of data between network devices

· How to ensure the non-repudiation of legitimate transactions

(3) Retaining transaction data

In order to meet the needs of value-added services such as marketing and data analysis, merchants or acquirers often store transaction data and even some sensitive data after the transaction authorization is completed. According to statistics from authoritative organizations, 92% of data breaches are caused by vulnerabilities at the application and system layers, so the protection of these key links also needs attention.

Third, the development and application of payment tokenization technology

How to solve the above problems, while eliminating sensitive data and realizing transaction authentication, as far as possible to ensure compatibility with the existing payment system is the starting point and core idea of ​​the design of the tokenization scheme. The development of tokenization is mainly divided into two phases:

The first phase is the non-payment mark proposed by VISA and PCI (a set of values ​​instead of PAN, which can be encrypted), such as FirstData and Cybersource for merchants to provide a tokenized acquiring solution; The lack of versatility and interoperability in the environment limits the promotion of the program.

The second stage is the payment mark proposed by EMV; the biggest feature of the program is to use Token to participate in the entire authorized transaction process, and to ensure the versatility as much as possible, thus solving the risk problem based on the card number.

(I) A brief analysis of the EMV tokenization framework

The EMV tokenization framework defines the system architecture (as shown below)

关于在银行卡产业推广支付标记化方案的思考——中国一卡通网

The framework describes the main roles and relationships in the existing payment industry and adds two roles, Tag Requestor (TR) and Tagged Service Provider (TSP), to provide tagging services to cardholders and merchants.

Page 1 of 2
Contact Us

Author:

Mr. Franky

Phone/WhatsApp:

+8618929582915

Popular Products
You may also like
Related Information
Customers use multiple S&A CW-5200 water chillers to cool UV laser marking machines

Employers of S&A are willing to learn and understand customers' needs, and so we visited a UV laser marking machine manufacturer of Shenzhen. During the visit, we were told by Mr. Chen from the...

Superiority Analysis of Copper Tensile Machine and Aluminum Alloy Cable Continuous Armoring Machine

Single-head copper continuous annealing machine and the world's most advanced Canadian aluminum cable continuous armoring machine is recognized as the best. Yong-hung large copper machine has the...

Aluminum ingots are clearly identified with high-temperature marking paints

【China Aluminum Industry Network】 aluminum ingot high-temperature marking paint, also known as marking paint, steelmaking, continuous casting, steel rolling and other steel production process,...

This plastic packaging marking technology makes plastic recycling easier

[China Packaging Network News] Sustainability has always been an important issue, especially for A&IP that is trying to reduce waste. Today, this smart technology makes it easier to recycle...

Related Categories

Email to this supplier

Subject:
Email:
Message:

Your message must be betwwen 20-8000 characters

Related Products List

Home

Product

About Us

Inquiry

We will contact you immediately

Fill in more information so that we can get in touch with you faster

Privacy statement: Your privacy is very important to Us. Our company promises not to disclose your personal information to any external company with out your explicit permission.

Send