the Case Study

eStudy
EMV® 2015:
Development &
Merchant Readiness
OpenEdge Research & Development Group
December 2015
855.443.8377
[email protected]
openedgepayment.com
blog.openedgepayment.com
eStudy
EMV 2015: Development &
Merchant Readiness
Table of Contents
Executive Summary........................................................................................... 3
The Payments Industry Landscape.................................................................. 4
Some Background on EMV®.............................................................................. 5
Why EMV Now?.................................................................................................. 6
Liability for EMV Transactions.......................................................................... 7
EMV Adoption Challenge................................................................................... 8
Edge Shield & EMV.......................................................................................... 10
How Can EMV Benefit Software Developers?................................................13
What Now?........................................................................................................13
EMV
Non EMV
855.443.8377
2
eStudy
EMV 2015: Development &
Merchant Readiness
Executive Summary
EMV®, the New Security Standard
The U.S is migrating to the EMV® security standard. The technology is based on a microprocessor
(or ‘smart chip’) that is virtually impossible to duplicate and will change the credit card purchasing
experience. The payments industry is instituting a liability shift in which the party in the payments
chain not enabling EMV will be considered responsible if fraud occurs.
A More Complicated Integration
Software developers offering credit card payments in their applications face a far more complicated
integration than was necessary with magnetic stripe technology. EMV certifications are expensive
and cumbersome.
Edge Shield
The OpenEdge answer to a simplified EMV integration is the Edge Shield security bundle.
Developer benefits include:
• A pre-certified EMV offering including device management and card brand certifications
• Supports mobile payments using NFC technology (e.g. Apple Pay™, Android Pay™)
• Future-proofing: easy addition of hardware devices in the future
• Encryption, protecting data in transit
• Tokenization, protecting data at rest in the POS
• PA-DSS 3.0 Out-of-Scope and PCI DSS scope minimization
• Developer Breach Reimbursement Guarantee
855.443.8377
3
eStudy
EMV 2015: Development &
Merchant Readiness
The Payments Industry Landscape
Card Data Breaches
The frequency and impact of card data breaches are increasing. A series of recent high profile
breaches at major retailers has provided a decisive impetus for the payments industry to institute
the long-planned transition to EMV. The U.S. payments industry began migrating to the new
standard in 2015.
Payment Card Fraud
The theft of payment card data is a lucrative criminal trade. The magnetic stripe technology on
credit and debit cards is notoriously easy to access and counterfeit. Well-organized, sophisticated
global criminal networks sell and use the stolen card data, often in other countries, before payment
industry participants can act. While U.S. consumers are largely protected against direct financial
losses, stolen cards or payment credentials affect everyone through the payment chain: issuing
banks, payment processors, and the businesses selling goods and services.
Estimated
Breaches Annually
950
Estimated
Customer Records
Compromised
Annually
750 million
Average Cost per
Stolen Record
$277
Lost
Business
Accounts for
56%
Records
compromised
since 2004
1 billion+
Source: OpenEdge and PCI SSC
of Data Breach
Costs
Mobile Technologies
In addition to traditional credit and debit plastic cards, the public uses smart phones for purchasing
goods, paying bills and mobile banking. Consumers and businesses using new cloud and mobile
technologies require secure, intuitive, seamless payments. This presents new opportunities and
challenges as businesses prepare to take payments using near field communications (NFC), mobile
and cloud technologies while protecting against fraud.
855.443.8377
4
tless
eStudy
EMV 2015: Development &
Merchant Readiness
Some Background on EMV
Counterfeit, Lost and Stolen Cards.
EMV – a microprocessor or ‘smart chip’ – is a fraud-reducing technology that protects against
losses from the use of counterfeit cards. It also combats lost and stolen card fraud when using a PIN
as a cardholder verification method. EMV cards generate a new code for every transaction, making
the card virtually impossible to counterfeit and re-use. When criminals steal card data, they can
manufacture new cards with a magnetic stripe, but not with a chip or the unique transaction code.
Counterfeit card use will be curtailed with the implementation of EMV devices at merchant
purchase locations.
EMV Standard
The payments industry answer to counterfeit card fraud is the EMV standard. It is nearly impossible
to duplicate a chip card. The microprocessor (smart chip) is embedded in EMV cards, interacting
with hardware devices and payment networks to ensure the card is authentic. This standard was
deployed decades ago and has been widely adopted in Europe and Asia. Major card networks such
as Visa®, MasterCard®, Discover®, American Express®, JCB and Union Pay maintain the EMV standard
though an organization known as EMVCo.
Front of Card
Back of Card
My Bank Card
Authorized Signature - NOT VALID UNLESS SIGNED
EMV Chip
Signature
My Bank Card Trust
This card is the property of My Bank Card. By signing, xnzcb vnbh vygbs vyrgvyu vsdgvh.
Vhsdfgvbuy hcywet hwegvh. Vnfjvh mnwetrf, vsdnvbsuh, vbshdvbhj vye vryw y8 fyg hcvbhvbh
vhus. Fhsnac yasdcg bgd ye vb.
VALID
THRU
CCA
Chip & PIN
****
Magnetic
Stripe
For Customer Service, call 1.888.567.8942
First
Bank
Chip
+Only
PIN + Signature.
Chip
Magnetic Stripe
The EMV chip stores data and supports multiple levels of authentication and communication
between the card, card reader and payment networks, ensuring the card is legitimate. This
technology comes in two flavors, mimicking how U.S. consumers use debit and credit cards today,
easing the transition to the EMV standard.
CHIP + PIN
Chip & Signature
Chip + PIN requires the cardholder to enter a password to confirm cardholder identity, and presents
a strong defense against lost and stolen card fraud. This authentication method is most common
withContactless
debit cards in the U.S. Chip & PIN
Chip Only
Magnetic Stripe
CHIP + SIGNATURE
****
Chip + Signature requires the cardholder to sign for the transaction at the point-of-purchase.
It’s frequently used for credit cards.
855.443.8377
5
eStudy
EMV 2015: Development &
Merchant Readiness
EMV Transactions and the New User Experience
Magstripe technology consists of only two back-and-forth communications. Yet, in an EMV
transaction, there are 12 back-and-forth communications between the hardware, POS application,
and card networks. The communications deal with card data authentication, cardholder verification,
risk management and authorization. The multiple communications result in a new consumer
experience and more complicated payment integration. Rather than swiping cards, consumers
insert them into a card reader (many are calling this action “dipping”). The user only removes the
card after the device indicated the transaction is complete and prompts the consumer. Merchants
will need to watch for consumers forgetting cards after the EMV transactions.
Drop in Card-Present Fraud
Countries adopting the EMV standard have seen a significant drop in card-present fraud.
United
Kingdom
69%
France
35%
Canada
Australia
30%
15%
Source: Federal Reserve Bank Atlanta
Why EMV Now?
More High-Profile Breaches
With EMV in place in other countries, worldwide counterfeit fraud has shifted, targeting the less
secure magnetic stripe standard in the United States. A recent rash of card breaches among large
retailers added a sense of urgency for the industry to implement the more secure technology. Card
data stolen elsewhere are used for purchases at U.S. merchants because of the lack of chip card
safeguards. As EMV becomes common, thieves will concentrate on merchants who do not adopt
the new standard.
Liability Switch Deadline
To motivate a nationwide transition to EMV, card networks instituted a liability switch in 2015.
Liability in the payment chain for counterfeit cards fall on the party with the least degree
of security.
Apple Pay™, Android Pay™
and Mobile Payments
April 2013
Processor Host
Compliance
855.443.8377
October 2015
Liability shift begins for
Visa, MasterCard, American
Express and Discover
(Automated Fuel
Dispensers are excluded)
October 2017
Liability shift begins
for Automated
Fuel Dispensers
Payments functionality in smart phones is
expanding rapidly. Apple Pay™ and Android
Pay™ use Near Field Communication
technology at NFC-enabled terminals
to facilitate payments through mobile
phones. NFC purchases carry the lower
rates associated with “card present”
purchases and provide fast, convenient
transactions.
6
eStudy
EMV 2015: Development &
Merchant Readiness
Liability for EMV Transactions
The key argument the industry uses for persuading businesses to adopt EMV is a “liability shift.” But
what does that mean? Liability for what? To whom is liability shifted, and under what conditions?
The short answer: EMV can prevent card-present
counterfeit fraud, so merchants processing cards
using EMV-enabled card readers and using proper
procedures are not liable for losses if counterfeit
cards are used. In the past, counterfeit card fraud
losses were absorbed by issuing banks. Now,
the liability for counterfeit fraud resides with
merchants not adopting EMV.
In 2014, transactions using counterfeit cards
represented 37% of all US credit card fraud. EMV
eliminates this situation. It is relatively easy to
manufacture magnetic stripe cards using card
data stolen during breaches, but extremely difficult
and impractical to clone the cards with a chip.
U.S. Card Fraud by Type, 2014
Other
Lost/stolen
4%
14%
45%
Online
(card not
present)
37%
Counterfeit
Source: Aite Group, “EMV: Lessons Learned and the U.S. Outlook,” June 2014.
The Rules
Card-present fraud liability resides with whomever is the least EMV-compliant party in a counterfeit
transaction. The key rule is that the party in the transaction chain that prevented the use of EMV
(card issuer, merchant or ISO/processor) is responsible should a counterfeit card be used.
It covers both domestic and cross-border (cards issued in other countries) counterfeit
How Does a Merchant
transactions.
Avoid the Liability
from Counterfeit Card
Transactions?
1. Acquire EMV-enabled card
reader(s) and POS software.
The EMV transition requires
upgrading software and buying
new card readers.
2. Use EMV to complete the
transaction.
It’s not enough to have an EMV
payment system. It must be
properly used. The transaction
has to use the EMV payment
flow, in which the customer
dips the card and conducts
and EMV transaction. When
a customer tries to swipe
the card, EMV devices will
recognize when the card has
a chip and prompt the user to
dip instead of swipe.
The policy assigns liability for counterfeit fraud to the party that has not made the
investment in EMV chip cards (issuers) or terminals (merchants’ acquirers). The policy
encourages wider deployment of EMV cards and terminals. MasterCard, American Express
and Discover support a liability for lost, stolen and never received/issued-cards residing
with the party not supporting PIN as a cardholder verification method. If neither party
supports PIN, only the counterfeit liability shift rules apply.
Apple Pay & Android Pay:
Also Shielding Merchants from Counterfeit Fraud
Apple Pay and Android Pay are secure payment systems similar to EMV, but use devices
instead of chip cards. The device does not store actual card data, but a card token, and
generates a unique code for each transaction. The algorithm for the code generation is in
a special chip – the “secure element” – in the device. The token’s unique device account
number is 16 digits long and handled as if it were a regular credit card number. The secure
element takes the role of the chip, generating the one-time use code for each transaction.
Face-to-face (in store) transactions are considered “card present.” Merchants require an
NFC-enabled terminal (common for EMV card readers). Customers’ devices communicate
with the NFC terminal to complete the transaction. Note that the card provisioned does
not need to be a chip card.
3. Enable Apple Pay in place
of EMV cards.
855.443.8377
7
eStudy
EMV 2015: Development &
Merchant Readiness
Card Provisioning and Account Fraud
Consumers enable payment on their mobile devices using their Apple or Android accounts or by
entering card data directly into the device (either by scanning a card with the device’s camera
or keying the card data). The device then sends the data to the card-issuing bank, which verifies
user identity and card validity by email, text or phone. Once the card and consumer identity are
confirmed, the device receives a token used for purchases.
Because these methods are so secure, the only fraud perpetrated so far has been “account fraud”
using stolen card data to provision Apple Pay or Android Pay, in which a thief impersonates the
cardholder when adding a card to the device, or creates a fraudulent account. It is up to the issuing
bank to verify authenticity, thus shifting liability back to the issuer.
EMV Adoption Challenge
Chicken or the Egg?
Businesses are not motivated to upgrade their equipment to EMV, as most of their customers
did not have chip cards. Issuing banks were not willing to incur the expense of issuing more
expensive chip cards because their customers had nowhere to use them. That paradox is
evaporating. At the end of 2015 over 70% of credit cards and 40% of debit cards in the U.S. had the
chip, and 50% of the merchants had EMV card readers. EMV and magnetic stripe technology will
co-exist for some time; the card readers will accept both payment types.
EMV Complexity
At the end of 2015...
The transition to EMV presents a major undertaking for software developers, merchants and
processors. Card brands have mandated that payment processors must be able to process
70%
40%
EMV transactions, yet EMV processing remains voluntaryoffor
merchants and
credit
ofpayment
debit software
developers. While software providers are not liable for fraud
that is preventable
cards
cardsby EMV, not
supporting EMV will clearly be a competitive disadvantage for these businesses. To avoid liability,
merchants will have to replace their terminals with devices capable of processing EMV transactions,
and obtain EMV-enabled software.
&
...in the U.S. had an EMV chip.
50% of merchants...
At the end of 2015...
1 processor x 4 card brands x 3 devices
70% = 12 EMV certifications
40%
of credit
of debit
EMV
EMVcards
EMV
cards Certified
Certified
Certified
&
EMV
Certified
EMV
Certified
EMV
Certified
...in the U.S.EMV
had anEMV
EMV chip.
EMV
Certified
Certified
Certified
EMV
Certified
EMV
Certified
EMV
Certified
50% of merchants...
ds x 3 devices = 12 EMV certifications
EMV
Certified
EMV
Certified
EMV
Certified
EMV
EMV
EMV
Certified
Certified
Certified
855.443.8377
EMV
Certified
EMV
Certified
EMV
Certified
50%
had EMV card readers.
50%
8
had EMV card readers.
eStudy
EMV 2015: Development &
Merchant Readiness
EMV Certification Challenge
Card networks require EMV certification for every instance of the payment process – every
combination of a payment processor, card network and card reader. For example, software
supporting payments through one payment processor, four card brands (Visa, MasterCard, Discover
and American Express) and three devices will require twelve EMV certifications.
When transaction processes change (POS software updates, new hardware, updated kernels),
the software developer must perform certifications again. Clearly, this is too complicated for most
developers. In response, some processors are launching simpler, cheaper ways to enable EMV
transactions. The approach uses a payment application that isolates the developer’s software from
payment data, so the POS is not subject to EMV certifications.
1 processor x 4 card brands x 3 devices = 12 EMV certifications
855.443.8377
EMV
Certified
EMV
Certified
EMV
Certified
EMV
Certified
EMV
Certified
EMV
Certified
EMV
Certified
EMV
Certified
EMV
Certified
EMV
Certified
EMV
Certified
EMV
Certified
9
At the e
eStudy
EMV 2015: Development &
Merchant Readiness
Edge Shield & EMV
Our EMV solution is part of the Edge Shield
security bundle. Edge Shield is a set of
complementary solutions combining
EMV processing, point-to-point (P2P)
encryption and tokenization. The goal is
to simplify EMV payments integration for
software developers and provide a secure
payment solution.
An advanced security technology that
prevents counterfeit fraud, the OpenEdge
EMV solution includes a pre-certified payment
application handling payment data and payment flow,
including device driving, so the POS software does not
have to (recall that chip card processing is much
more complicated than magnetic stripe processing).
EMV: In Scope vs. Out of Scope
POS Developer in EMV Scope
VISA
MASTERCARD
DISCOVER
AMERICAN EXPRESS
DEBIT
EMV
DEVICE
POS
REGULAR
GATEWAY
PROCESSOR
POS Developer
out of EMV Scope
POS
PRE-CERTIFIED
PAYMENT
APPLICATION
EMV Only
Encryption + Tokenization
EMV + Encryption + Tokenization
855.443.8377
EMV
DEVICE
PROCESSOR
VISA
MASTERCARD
DISCOVER
AMERICAN EXPRESS
DEBIT
Prevents
Counterfeit Fraud
Protects Data
in Transit
Protects Data
at Rest
3
7
3
7
3
3
7
3
3
10
eStudy
EMV 2015: Development &
Merchant Readiness
Edge Shield Benefits
The benefits for a software developer using Edge Shield include:
• No EMV certification needed
• No device driving needed
• Supports mobile payments using NFC technology (e.g. Apple Pay, Android Pay)
• Future-proofing: easy addition of hardware devices in the future
• Encryption, protecting data in transit
• Tokenization, protecting data at rest in the POS
• PA-DSS 3.0 Out-of-Scope and PCI DSS scope minimization
• Developer Breach Reimbursement Guarantee
Note that the EMV standard only deals with card and (with PIN) cardholder authentication.
It does not address the security of the payment data itself, which could be transmitted in clear
text. To protect card data, Edge Shield adds P2P encryption and tokenization. The payment
application ensures that card data – encrypted at the source – is securely delivered to the
OpenEdge processing platform so it cannot be stolen and misused by hackers.
Vulnerable Systems
Some processors may have solutions in which data is not encrypted at the entry point and,
therefore, remains vulnerable until encryption occurs within the software. Or, in some gateway
software supporting multiple processors, data may be decrypted and re-encrypted in the
payment software before reaching the secure environment of a payment processor.
855.443.8377
11
eStudy
EMV 2015: Development &
Merchant Readiness
Edge Shield Architecture
There are two ways to implement an EMV pre-certified payment application:
• Install it on a PC
software differentiation
through payment innovation
• Install it on a card reader
Payment App on PC vs on Card Reader
EMV Controller Residing on a PC
EMV Controller Residing on an EMV Device
EMV Device +
Payment App
EMV Device
Mobile
$20.15
PAY HERE
POS + Payment App
$20.15
PAY HERE
POS
PAY HERE
Non-EMV
Devices
Kiosk/
Unattended
SCALABLE
Supports multiple points of interaction
Supports multiple devices
NOT SCALABLE
Does NOT support multiple points of interaction
Does NOT support multiple devices
The application, when placed on high-end card readers (typically Linux®-based), only supports
insertion/swipe of the card. If a business needs to support a variety of devices, card insertion/swipe
and keyed entry (typically by clerk), having the EMV application on a PC is recommended. It is easier
to add future devices when the application is not specific to the device or manufacturer. For these
reasons, OpenEdge supports EMV applications installed on the PC.
Edge Shield
Application
on Device
Supports high-end devices
Yes
Yes
Features
Supports cheap low-end devices
Yes
No
One integration supports both card present
(dip or swipe) and keyed transactions
Yes
No
Future proofing: new devices can be easily
and quickly added
Yes
No
Developer Support
An integral part of the Edge Shield solution is a dedicated support for software developers to
provide “best practices” for integration and security by providing hands-on help with integrating and
verifying the payments integration.
855.443.8377
12
eStudy
EMV 2015: Development &
Merchant Readiness
Edge Shield Summary
OpenEdge’s Edge Shield simplifies the EMV transition for developers and merchants while reducing
developers’ effort and liability. That results in significant savings in time, effort and cost – initially and
for the long-term as updates to the POS software or payment devices occur.
OpenEdge provides a pre-certified EMV offering for developers, manages device driving and
certifications, so developers can implement EMV swiftly with minimal effort. It also takes developers
out of PA-DSS scope and minimizes the PCI DSS scope using secure technologies. We are so
confident about our security technology that we offer a Developer Breach Reimbursement
Guarantee for those integrating Edge Shield payment technology.
How Can EMV Benefit Software Developers?
Significant Business Opportunity
For software developers, EMV migration is a challenge that can be turned into a major business
opportunity. They can position themselves as being the most up-to-date, forward-thinking software
providers in their fields. New EMV payments functionality may be marketed to new customers,
re-invigorating current and past relationships, selling more software upgrades, and improving
market competitiveness.
What Now?
Start planning your EMV strategy now. Developers should:
• Contact OpenEdge to get the integration of EMV payment functionality on their roadmaps
• Communicate EMV plans to customers and prospects
• Get ready to adopt this new, secure payments technology with minimal disruption
About OpenEdge
OpenEdge helps software developers and businesses succeed by delivering secure and
personalized payment solutions. As the integrated payments division of Global Payments,
OpenEdge is driving innovation – adapting, scaling and simplifying how payments are processed,
across platforms and points-of-interaction, in an increasingly complex landscape. OpenEdge
serves more than 2,000 technology partners across 60 industry verticals throughout the United
States and Canada.
© 2016 OpenEdge, a division of Global Payments, operates through the following entities: OpenEdge Payments LLC is a registered ISO of Wells Fargo Bank, N.A., Walnut Creek, CA and a registered ISO of BMO Harris Bank N.A., Chicago, IL and a registered ISO/MSP of Synovus Bank, Columbus, GA.
PayPros LLC is a registered ISO of Wells Fargo Bank, N.A., Walnut Creek, CA.
EMV® is a registered trademark owned by EMVCo LLC.
American Express is a registered trademark of American Express Company, its subsidiaries and/or affiliates.
Android and Android Pay are trademarks of Google Inc.
Apple, Apple Pay, Apple Watch, iPad, iPhone and iTunes are trademarks of Apple Inc., registered in the U.S. and other countries.
Discover belongs to Discover Financial Services and its affiliates.
Linux is the registered trademark of Linus Torvalds in the U.S. and other countries.
MasterCard is a registered trademark of MasterCard Worldwide or its subsidiaries in the United States.
VISA is a registered trademark of Visa in the United States and other countries.
QIR™ is a trademark owned by PCI Security Standards Council, LLC.
OEEMVCSA-SD-100716-TN