4 min read
The Four Corners Model for Card Payment Security and Key Management
The “Four Corners” model, also called the “Four Party Scheme”, is utilized in almost all standard card payment systems across the globe. Here, we...
4 min read
The “Four Corners” model, also called the “Four Party Scheme”, is utilized in almost all standard card payment systems across the globe. Here, we...
3 min read
EMV Personalization is a process used to get card data into cards, mobile phones, and wearables. The process includes a variety of complicated...
5 min read
Here we explain why additional security mechanisms, beyond the mobile OS security features, are needed to protect mobile banking applications from...
3 min read
As the use of mobile phones for mobile banking and payment applications increases, corresponding security threats are increasing as well. The...
4 min read
Among all the various key block formats, the TR-34 format is undoubtedly one of the most sophisticated. The TR-34 norm is an implementation of the...
3 min read
This article proposes a few answers to a series of frequently asked questions (FAQs) about key blocks and their use with PCI.
4 min read
In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating...
3 min read
Merchants are one of the corners of the ‘four corner’ model in the payment world. In what follows, we will explain some of the security mechanisms...
3 min read
An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and...