EMV Payment Security - Acquirers

EMV Payment Security - Acquirers

In the “four corner model”, acquirers are apparently the less active party as their role seems ‘only’ to forward the transaction flow originating from the merchant to and from the issuer. In the model, the acquirer is the merchant’s bank.

EMV Payment Security - Merchants

EMV Payment Security - Merchants

 

Merchants are one of the corners of the ‘four corner’ model in the payment world. In what follows, we will explain some of the security mechanisms for Merchants to prevent unauthorized transactions and payment card fraud.

EMV Payment Security - Issuers

EMV Payment Security - Issuers

An issuer is one of the corners in the ‘four corner’ model. An issuer is a financial organization (e.g. a bank) that produces payment cards and allows the cardholders to use them.

A Brief Overview of the Challenges Involved in Key Management for EMV Personalization: The Main Actors of EMV Personalization

A Brief Overview of the Challenges Involved in Key Management for EMV Personalization: The Main Actors of EMV Personalization

The EMV personalization data processing in itself is not the topic of this article, we will instead focus on the cryptographic schemes involved in EMV personalization, as well as the key management involved; which is both complex and mandatory.

EMV Payment Security - Cardholders

EMV Payment Security - Cardholders

Cardholders (or consumers) are one of the corners of the ‘four corner’ model in the payment card world. Here we take a brief look at the payment security in relation to cardholders.

Cryptomathic CKMS: Centralized & Automated Key Management for payShield HSMs

Cryptomathic CKMS: Centralized & Automated Key Management for payShield HSMs

Banks and financial institutions must adhere to a rigorous set of security and regulatory practices to protect data, communications, and processes.

Cardholder, Merchant, Issuer & Acquirer - The Four Corners Model for Payment Security and Key Management

Cardholder, Merchant, Issuer & Acquirer - The Four Corners Model for Payment Security and Key Management

The “Four Corners'' model, also called the Four Party Scheme, is utilized in almost all standard card payment systems across the globe. Here we introduce that model and explain what type of hardware security module (HSM) is needed for each of its components involved in the cryptographic process.

Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

Crypto Service Gateway: Enabling Crypto-Agility with the CSG Policy Engine

The business world today is built on the pervasive use of cryptography, to authenticate people and processes, to secure communications, and to protect sensitive data.

NIST & FIPS Considerations for EMV Tokenization

NIST & FIPS Considerations for EMV Tokenization

In this article, we will review some of the constraints of an EMV tokenization solution when it comes to FIPS and more generally, NIST considerations.