emv overview

51
Overview of EMV Specification

Upload: manishthegreat

Post on 23-Oct-2014

242 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: EMV Overview

Overview of EMV

Specification

Page 2: EMV Overview

Objective of the Session

To explain the scope of the EMV specifications and

associated hierarchy. Additionally to gain an

understanding of EMV functions.

Page 3: EMV Overview

Agenda

Payment specifications review

EMV functional overview

Transactions flow

Functions available

Offline authentication processes

Offline risk management processes

Online authentication and message integration

Page 4: EMV Overview

Payment Specifications Review

EMV specification hierarchy with the payment industry

AEIPS MCHIP VIS

CB5 NATIONAL (examples)

ASSOCIATIONS

INDUSTRY

J/Smart D/PAS

Page 5: EMV Overview

EMV ICC Specifications for Payment

Systems

Book 1 :

Application Independent ICC to Terminal Interface

Requirements

Book 2 :

Security & Key Management

Book 3 :

Application Specification

Book 4 :

Cardholder, Attendant and Acquirer Interface

Requirements

Page 6: EMV Overview

Book 1: ICC to Terminal Interface

Specification

This specification describes the minimum functionality

required for integrated circuit cards (ICC) and terminals to

ensure correct operation and interoperability independent of

the application to be used.

ISO 7816 – 1 / 2 / 3

Electromechanical characteristics

Logical interface

Transmission protocols

ISO 7816 – 4 / 5

Files structure & referencing

Message structure

Application selection

Page 7: EMV Overview

Book 2: Security & Key Management

Offline Static Data Authentication (SDA)

Offline Dynamic Data Authentication (DDA)

Offline PIN Encipherment

Application Cryptogram generation

Public key management principles and policies

Terminal security requirements

Secure messaging

Page 8: EMV Overview

Defines the terminal payment application

Mapping of data elements to files

Transaction flow and the set of commands issued to the

card

Coding of specific data objects

Chip electronic commerce specification

Acquirer Issuer Issuer

NPCI

Book 3: Application Specification

Page 9: EMV Overview

Book 4: Terminal Specification

General requirements

Terminal types and capabilities

Functional requirements

Physical characteristics

Security requirements

Software architecture

Interfaces: Cardholder, Attendant, Acquirer

Page 10: EMV Overview

EMV Transaction Flow

Application Selection

Application Initiation

Reading Application Data

Setting Up

Offline Data

Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Action Analysis

Online Processing

Issuer Authentication

Script Processing

Terminal Risk

Checks

Authorization

Decision

Completion

Card Risk Management

Terminal Action Analysis

Page 11: EMV Overview

Preventing Fallback Transactions

SWIPE

Please read card via

chip reader. Service Code = Chip

2 (chip international)

6 (chip domestic)

Chip Card Chip Device

Page 12: EMV Overview

Application Selection

Terminal decides which application

to use for the transaction – important

as we move into multiple application

cards

Application Identifier – AID

(2 components)

Identifies scheme : AXXXXXXXXX

Identifies Product/Acceptance Mark

Credit / Debit: XXXX

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Page 13: EMV Overview

Application Selection: 1 Match

RuPay Debit

E-Purse

RuPay Debit

Loyalty

Easy Air Miles

Page 14: EMV Overview

Application Selection: 2 Matches

RuPay Debit

Visa Electron

Easy Air Miles

RuPay Debit

Loyalty

Easy Air Miles

Page 15: EMV Overview

Application Selection: 2 Matches

Cardholder selects which application to use

Press 1 for RuPay Debit

Press 2 for Easy Air Miles

Page 16: EMV Overview

E-Purse

Easy Air Miles

RuPay Debit

Application Selection: No Matches

Page 17: EMV Overview

Applications Selection: No Matches

Transaction is terminated

No Application

Found

Page 18: EMV Overview

Application Initiation

Before the transaction starts, the

terminal needs to know the profile of the

card:

Do you support SDA? DDA?

Do you support Issuer authentication?

Where are the data (needed for the

transaction) stored in the chip?

The card will send this information to the

terminal (AIP, AFL), in order to initiate

the transaction

AIP: Application Interchange Profile

AFL: Application File Locator

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Page 19: EMV Overview

Reading Application Data

With the information gathered during the

“Application Initiation” phase, the terminal

reads the data (referred to as tags) from

the card

At this stage of the transaction the data

are stored by the terminal

The terminal will use the data during the

transaction and the risk management

phase (SDA, check expiry date,…)

SDA: Static Data Authentication

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Page 20: EMV Overview

Offline Data Authentication

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Offline authentication (SDA or

DDA) is performed

Terminal uses RSA cryptography

to verify the authenticity of the data

in the card

SDA: Static Data Authentication

DDA: Dynamic Data Authentication

RSA: Rivest Shamir Adleman

Page 21: EMV Overview

Offline Data Authentication

Before a card transaction can take place, certain card data is

authenticated by the terminal.

There are three methods of offline card authentication, both

involving RSA and EMV certificates.

Static Data Authentication (SDA)

Dynamic Data Authentication (DDA)

Combined DDA/Application Cryptogram Generation (CDA)

In all cases, payment system public keys are stored in the terminal

and an Issuer public key certificate is stored on the card.

Issuer certificate is signed by the Payment System CA

CA: Certification Authority

Page 22: EMV Overview

Static Data Authentication (SDA)

Static data on the card is signed using the RSA private key of the Issuer and the result is stored on the card.

Static Authentication Data includes:

– Primary Account Number (PAN)

– Application Expiry Date

– Issuer Parameters

SDA does not prevent replay attacks.

Benefits

SDA is used to validate that certain data elements on the card have not changed since the card was issued.

Page 23: EMV Overview

(Issuer)

SISS

Private Key

(Issuer)

PISS

Public Key

Private Key

(CA)

SCA

Public Key

(CA)

PCA

PISS certified

with SCA PCA distributed to Acquirer

for loading in Terminal

Card static

data

SDA - Initialization Phase

Page 24: EMV Overview

Dynamic Data Authentication (DDA)

DDA provides authenticity and integrity of ICC and terminal dynamic

application data (signed by ICC private key).

Allows detection of unauthorized alteration of ICC data after the card

has been personalized.

Prevents replay attacks and ICC counterfeiting.

DDA involves a terminal Unpredictable Number and Dynamic ICC

Data. ICC: Integrated Circuit Card

… It requires a special type of chip (crypto-processor) which is more expensive and DDA is more complex to personalise

Benefits

DDA is stronger than SDA because it is dynamic and uses transaction specific data so it protects against skimming but…

Page 25: EMV Overview

(Issuer)

SISS

Private Key

(Issuer)

PISS

Public Key

Private Key

(CA)

SCA

Public Key

(CA)

PCA

PISS certified

with SCA PCA distributed to Acquirer

for loading in Terminal

(ICC)

SIC

Private Key

(ICC)

PIC

Public Key

PIC certified

with SISS

DDA - Initialization Phase

Page 26: EMV Overview

First four steps are the same as with standard DDA

– Retrieval of Certificate Authority Public Key

– Retrieval of Issuer Public Key

– Retrieval of Issuer Public Key

– Verification of Signed Static Application Data

No other DDA processing is done until later in the transaction when the card signs

and returns the Application Cryptogram and other data to the terminal

Successful recovery of the data proves that the Application Cryptogram came from

the genuine card

Benefits

• Like DDA and SDA, it proves that the card data is valid and has not been

altered

• Like DDA, it proves that a genuine card is present

• Additionally, it allows the terminal to verify that the Application Cryptogram

came from the valid card

Combined DDA/AC Generation

Page 27: EMV Overview

Do the Application

Version Numbers match?

Can the card be used

for the transaction?

Is the card effective?

Is the card expired?

Usage Controls

» Domestic cash

» International cash

» Domestic goods

» International goods

» Domestic services

» International services

» ATM’s

» Devices other than ATM

» Cashback domestic

» Cashback International

Processing Restrictions

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Page 28: EMV Overview

Cardholder Verification

The issuer decides on their

Cardholder Verification Method (CVM)

List and personalises it onto the card

Offline PIN (Plaintext and/or

Enciphered), Signature, Online

PIN, No CVM

The terminal reviews the card’s

Cardholder Verification Method (CVM)

List and determines which cardholder

verification method to use for the

transaction (based on the cardholder

verification methods supported by the

terminal)

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Page 29: EMV Overview

Signature

No CVM

Offline Enciphered PIN

Offline Plaintext PIN

Online PIN

Signature

No CVM

Terminal’s Supported CVMs Card’s CVM List

The terminal checks the card’s CVM list and the first mutually supported method Is selected

For this example: Signature

X

X

X

CVM Decision: Signature

Page 30: EMV Overview

The terminal checks the card’s CVM list and the first mutually supported method Is selected

For this example: Offline Plaintext PIN

Offline Enciphered PIN

Offline Plaintext PIN

Online PIN

Signature

No CVM

Offline Plaintext PIN

Online PIN

Signature

No CVM

Terminal’s Supported CVMs Card’s CVM List

X

CVM Decision: Offline Plaintext PIN

Page 31: EMV Overview

Terminal Risk Management

Card on terminal exception file?

Amount over the floor limit?

Randomly selected for online?

All processing executed by the terminal

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Page 32: EMV Overview

Terminal checks results

so far. Generates

Terminal Verification

Results (TVR) and

provides its position

to the card

Approve Request

Decline request

Go online request

The terminal records results of risk management checks in Terminal Verification Results (TVR)

Terminal Risk Management

Page 33: EMV Overview

I think we should go

online – what about you?

Terminal Sends Decision to Card

Page 34: EMV Overview

Card Responds

Let me do some further

checks to see if I agree

with you

Page 35: EMV Overview

Card Action Analysis

The card does additional risk

management checks to see if it

agrees with the terminal’s decision

Think of “checks and balances”

Helps to prevent a fraudulent card

and merchant collusion

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Page 36: EMV Overview

Decision

Previous Txn

checks

Not completed

Issuer script failed

SDA failed

DDA failed

Counter checks

Dom. Offline Limits

Int’l Offline Limits

Domestic currency

Offline spend

2nd currency

Offline spend

New Card

PIN exceeded

The card records results of risk management checks in Card Verification Results (CVR)

Card Action Analysis

Page 37: EMV Overview

These are some of the Offline Authorisation Control limits on the

card

50

Total Offline Trans.

Amount Limit

Total # of Offline

Trans. Limit

3

Example of Offline Authorisation Controls

of the Card

Page 38: EMV Overview

I purchase train ticket for $20

How much do I have left to spend off-line?

How many more times can my card stay off-line?

Cumulative Total Offline

Trans. Amount

50

Total Offline Trans.

Amount Limit

0 0 0 2 0

Total # of Offline

Trans. Limit

3

Cumulative # of

Offline Trans.

0 1

Example of Offline Authorisation Controls

of the Card

$30 and 2 transactions left for off-line

Page 39: EMV Overview

Example of Offline Authorisation Controls

of the Card

I purchase a coat for $300.

What happens?

Cumulative Total Offline

Trans. Amount

50

Total Offline Trans.

Amount Limit

0 0 0 2 0

Total # of Offline

Trans. Limit

3

Cumulative # of

Offline Trans.

0 1

Transaction is sent online because Total Offline

Transaction Amount Limit is triggered.

(Total # of Offline Transaction Limit is not triggered).

Page 40: EMV Overview

Once my card goes on-line, all off-line

parameters are reset back to ‘0’

Cumulative Total Offline

Trans. Amount

50

Total Offline Trans.

Amount Limit

0 0 0 0 0 0

Total # of Offline

Trans. Limit

3

Cumulative # of

Offline Trans.

0 0

Example of Offline Authorisation Controls

of the Card

Page 41: EMV Overview

Terminal

requests

Decline

Online

Approve

Decline

Decline

Decline

Online

Online Approve

Card can respond with

Approve? Decline? Send Online?

Who is in control of the decision?

X X

X

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Page 42: EMV Overview

Online Message (Card to Issuer)

The transaction is sent online to the

issuer

The card generates a cryptogram to be

sent to the issuer (online authentication)

The cryptogram and the results of all the

offline risk management checks (SDA

results, expiry date results, etc.) are sent

online

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Page 43: EMV Overview

EMV Functional Overview

Important Note :

All EMV messages (generated from terminals using EMV cards)

will be longer than normal magnetic stripe messages as they

include additional chip data

Mag stripe Authorisation message

EMV Authorisation message CHIP DATA

Page 44: EMV Overview

Online Message (Issuer to Card)

The issuer validates the cryptogram

using their host system (DES keys)

The issuer can review the offline risk

management checks

The issuer must send a cryptogram in

the response so that the card can

validate the issuer (for mutual

authentication)

The issuer can send Issuer Scripts in the

response (to dynamically update

information on the card)

Application Selection

Approve?

Decline?

Online?

Online

Scripts

Offline

Application Initiation

Reading Application Data

Offline Data Authentication

Processing Restrictions

Cardholder Verification

Terminal Risk Management

Card Risk Management

Authe

nticatio

n

Page 45: EMV Overview

Card validates Issuer

Via secure message

Sends secure message

(MAC) using DES

Card validates integrity

of the script request

Sends script command

Enciphered with DES

Card applies script

command

Terminal is used as a

pass through device

Issuer Scripts

Page 46: EMV Overview

Transaction Certificate Generation

Acquirer Issuer Issuer

NPCI

MDK

UDK MDK

Page 47: EMV Overview

Transaction Certificate Generation

NFC must validate ARQC using MDK (Card Authentication)

Acquirer Issuer Issuer

NPCI

MDK

UDK

MDK UDK

MDK

Page 48: EMV Overview

EMV Functional Overview

SDA

Static data

authentication

Off-line auth

controls

On-line

Card / Issuer

authentication

DDA

Dynamic data

authentication

Script updates CVM

Card Verification Method

Off-line PIN

On-line PIN

Signature

No CVM

Page 49: EMV Overview

EMV Functional Overview

Benefits

Offline checks (SDA, DDA, PIN, …)

Different level of offline security (different cost)

Online authorisation for added security

Enables flexibility in the cardholder verification

Ensures global inter-operability in the cardholder verification

method (CVM)

Allows card to make risk management decisions

Reduces account losses

Expand into new market segments

Page 50: EMV Overview

Key Points

EMV covers card-terminal interface

EMV transaction more complex than magnetic stripe

EMV functions provide different benefits to payment

processing

Business decisions can drive EMV functionality

EMV Functionality will have different impacts on the

system

Page 51: EMV Overview

Thank you