The new EMV® 3D Secure protocol, or 3D Secure 2 (3DS2), released by EMVCo is designed to address a number of key aspects of the previous protocol and cement the technology’s reputation as one of the most resilient solutions in the fight against card-not-present (CNP) online fraud.
Online payment trends keep evolving as customers continue to favour more user-friendly solutions and solution-makers compete for market share by constantly trying to re-invent the next big thing, to fulfil that need.
3DS2 is more than just an update of an old standard. It is designed with the intent to create a frictionless payment experience for cardholders. It will do this by facilitating a richer cardholder data exchange, allowing risk-based authentication by issuers for low risk transactions, instead of authentication challenges to the cardholder, such that most authentication activity will be invisible to the cardholder.
This paper outlines the existing and evolving standards being used for authenticating card-not-present payment transactions in the fight against fraud in the e-Commerce environment. It considers 3D Secure 1 and 2; the in-country standards of India (PaySecure), China (UPOP) and Russia (MIR); the European PSD2 Directive; and the strong growth in online payments forecast for the Asia Pacific region.
The paper is designed for those who require a better understanding of two-factor authentication concepts and products. It provides information for business and technical personnel who are involved in the decision making process regarding the authentication strategy of an organisation.
The aim of this paper is to discuss the reasons for adoption of a two-factor authentication solution, what the problems associated with implementing such a solution are and how many of these problems can be overcome with the provision of an industry-wide two-factor authentication solution.
This paper outlines the need for increased security, integrity and authenticity in online transactions. It briefly covers the existing standard of performing online transactions using the SSL protocol and highlights some of the shortcomings of this method.
There is currently confusion in the market over a range of “smart” technologies used by payment vendors. These include profile-based form-filling, ECML, intelligent form population and agent/bot technology. This fact sheet is designed to highlight the capabilities of each of these technologies along with the advantages and disadvantages of each technique.
This whitepaper outlines the background of the wallet concept, the role of wallets in society and the need for electronic wallets as we enter the Information age. A focus is the need for individual identification and the ability to exchange value which is now converging in the single process of authentication and payment.
This whitepaper outlines the concept, benefits and a high-level overview of a pseudo credit card architecture. A number of variations on the basic concept have arisen and it is important to contrast the different approaches to disposable card numbers, single-issue card numbers, pseudo card numbers and virtual credit cards in the market.