Coloque aquí el Título de su Tema a exponer
Transcription
Coloque aquí el Título de su Tema a exponer
Digital Payments Solutions security, maturity and user convenience Stéphane Fabre, Gemalto México 1 Agenda • Digital payment ecosystem: models, technologies, stakeholders • Payment Credentials: in tamper-proof devices, in the software host, in the cloud • Payment methods comparison in terms of security, solution maturity, convenience and customer reach Main objective: assessment of the different methods in digital payment in terms of security, solution maturity and user convenience Digital payment ecosystem Online and in-store 4 ways to complete a payment S/W, NFC, SIM, SE TEE, QR, BLE, HCE, TSM, TSP, OTP SMS, USSD Multiple technologies to coexist Mobile payment services launched or at pilot phase worldwide Users expect a payment service to come with Security: Keeping money protected from fraudsters Rewards: The benefit Simplicity: Providing a seamless enrollment and making the daily use of the payment solution simple of using a payment solution Reliability: Making sure that the payment service works every day Services: The benefits beyond payments (shopping experience prior and after payment) Payment solutions are evaluated based on User adoption: A simple customer journey, both for enrollment and day to day usage Liabilities: Mitigating the risks Value-add: Differentiated services from competition Brand impact: A digital payment expansion of the core business Go-to-market path: The deployment to deliver the services to the target users Online and In-Store Digital Payment CARD NOT-PRESENT PAN/exp date/CVV CNP Token NFC Login/PWD with registered card + Out of band security (OTP) Biometrics QR WIFI BT Key architectural elements **** *** * Host or + TEE END-USER EMV STICKER COMMUNICATION LAYERS BACK-END Payment Credentials Storage In tamper-proof devices In the software host In the cloud Payment Credentials in tamper-proof devices **** EMV Cards (*) or Tokens as digital payment credentials (**) + TEE (*) EMV cards/Proxy cards issued and stored at the Financial Institution (**) Tokens generated by Token Servive Providers with funding PANs kept in a HSM C Payment Credentials in the software host **** Tokens as digital EMV credentials Payment Credentials stored in the cloud **** Online access to payment credentials (stored in the cloud) Cloud PAYMENT METHODS COMPARISON Security Solution maturity Convenience Customer reach In-Store Online Security threats Payment method Types of attacks Target PAN/exp date/CVV Malware Device Login/pwd (registered cards) Phishing for login/pwd PAN/credentials databases Device Network Login/pwd + OTP Malwares (App specific) Device P2P Phishing for login/pwd Device Mobile NFC Mobile phone & PIN theft Device Mobile QR Malware Device Network EMV Card Card and PIN theft Card Magnetic Stripe Card Skimming/credential database Card Database Payment credential in tamper-proof devices EXAMPLE: ANY SE BASED (SIM or eSE such as APPLE PAY) Security level Addressing handsets diversity Addressing network diversity Solution maturity User convenience Payment credentials in TEE EXAMPLE: SAMSUNG Security level Addressing handsets diversity Addressing network diversity Solution maturity User convenience Payment credentials in the cloud EXAMPLE: AMAZON.COM Payment credentials in the software host EXAMPLE: Google Wallet Security level Addressing handsets diversity Addressing network diversity Solution maturity User convenience Security level When compared Addressing handsets diversity Addressing Network diversity Benefits for Banks capitalize on MNO’s customer service (in case of SIM) in the SE Solution maturity User convenience address network diversity in the TEE Ownership of their SEs Benefits for MNOs and Handset Makers in the cloud in the software host Takeaways Multiple payment methods will coexist It’s not only about security It’s also about convenience, brand impact and deployment feasibility Large scale deployments today rely on field-proven technology