E-COMMERCE CIT 245 By Mohammed A. Saleh 1 CONTENT The Payment Revolution Using Payment Cards Online Smart Cards Store-Value Cards E-Micropayments E-Checking E-Bill Presentment and Payment B2B E-Payments The Sales Tax Issue PKI Infrastructure 2 FRAUDULENT CREDIT CARD TRANSACTIONS In the online world, merchants are held liable for fraudulent transactions.. Accepting fraudulent transactions incurs additional costs of fees and penalties imposed by the credit card associations. Combating fraudulent transactions is costly, the costs include costs of tools and systems to review orders. Surveys have shown the fraudulent cases are a growing problem for online merchants. 3 FRAUDULENT CREDIT CARD TRANSACTIONS Documented surveys by CyberSource 2004 depicts the following trends: - fraud increased from $1.9 bil to $2.6 bil due to increased number of businesses. - 1.3% of merchant orders were fraudulent. - Some merchants were more susceptible to fraud than others. Reason being: merchant’s visibility on the Web, ease of selling products in an open market and the merchants size. CyberSource (2005) showed the surveys conducted by merchants to combat fraud. 4 FRAUDULENT CREDIT CARD TRANSACTIONS Merchants spent a lot to combat fraud as compared to the revenues they gained. Key tools used were: 1. Address Verification System (AVS) - used by 82% of merchants - compares the address entered on a Web page with the address information on file with cardholder’s issuing bank. - results in false positives. 1. Manual review - used by 73% of all merchants 5 FRAUDULENT CREDIT CARD TRANSACTIONS - 1. - - relies on staff to review suspicious orders manually. suitable for smaller merchants. for larger merchants the method does not scale well Card Verification Number (CVN) used by 56% of all merchants. compares the verification number of the card with the information file with the card holders issuing bank. If the card is stolen then this method is compromised 6 FRAUDULENT CREDIT CARD TRANSACTIONS 1. - 1. - Fraud screens and decision models used by 53% of all the merchants. based on various automated rules that determine whether a transaction should accepted, rejected or suspended. merchant has the ability to change the rules to reflect changing trends in the fraud. Negative files used by 45% of all merchants. consists of the customers information (IP add, name, shipping/billing add, contact) 7 FRAUDULENT CREDIT CARD TRANSACTIONS A transaction is matched against this file and flagged if the customer is known problem. Overall impact is that the merchants are rejecting significant amount of orders due to suspicion of fraud. 8 VIRTUAL CREDIT CARDS Online purchases are growing fast. Consumers are still cautious of using their credit card numbers online. Virtual does address these concerns. Online buyers are provided by the card company at the time of the purchase a randomly generated tied to the buyer’s actual card number. Used only once and hence the name singleuse card numbers. 9 VIRTUAL CREDIT CARDS i. ii. They combat certain types of fraud, but have drawbacks. Single-use numbers cannot be confirmed at a later date No way to pay recurring bills or subscriptions This service was introduced in 2004 but later discontinued. It was called Private Payment. One exception is the Discover Card. Discover Financial Services offers its customers a single-use card service called Discover Deskshop. 10 VIRTUAL CREDIT CARDS - Customers download a small piece of software called Deskshop Software pops up whenever a customer encounters a checkout form. Has the same expiration date as the actual card means it can be used for recurring bills but from the same site. 11 SMART CARDS Used in place or addition of traditional credit and debit cards. Looks like a plastic payment card but it is distinguished by the presence of an embedded microchip. The embedded chip may be a microprocessor combined with a memory chip or just a memory chip. Information on the chip can be added, deleted or manipulated. 12 SMART CARDS This microprocessor is capable of running programs but not as a stand-alone computer. Programs and data must be downloaded from and activated by some other device (ATM machine) 13 SMART CARDS 14 TYPES OF SMART CARDS - - - Contact card Activated when inserted into a smart card reader and then passes data to and from the embedded microchip. Have a small gold plate, which when inserted into the smart card reader it makes electronic contact and data are passed to and from the chip. They have an EPROM or EEPROM. 15 TYPES OF SMART CARDS - - - Contactless (proximity) card Card has only to be within a certain proximity of a smart card reader to process a transaction. Has an embedded antenna, by means of which data and applications are passed to and from the card through the card’s antenna to another antenna attached to the smart card reader. Used in applications where data needs to be processed quickly e.g. mass-transit applications. 16 TYPES OF SMART CARDS Other types include the hybrid and dualinterface smart cards. Hybrid smart card has two separate chips embedded in the card; contact and contactless In contrast, dual-interface has a single chip that supports both types of interfaces. The benefit of either cards is it eliminates the need to carry multiple cards to support various smart card readers and applications. 17 TYPES OF SMART CARDS Smart card reader - read/write device - Purpose is to act as a mediator between the card and the host system that stores application data and processes transactions. - There a two types basic types contact and proximity – which match the particular type of card. - May be transparent, requiring a host device to operate, or stand-alone, function independently. 18 TYPES OF SMART CARDS A single reader is low in cost but may rise the costs if there is a large population of users to be serviced. Widespread use of smart cards for multiple applications requires standardization and interoperability among various card and card reader technologies. Q: What if there were no standards ? - 19 TYPES OF SMART CARDS 20 TYPES OF SMART CARDS Global Platform (globalplatform.org) - An international, nonprofit smart card association. - Main goal is to create and advance inter operable technical specifications for smart cards, acceptance devices and systems infrastructure. Technical standards governing smart cards are set by ISO. ISO/IEC 7816 and ISO/IEC 14443 are the main standards pertaining to contact and contactless cards respectively. 21 TYPES OF SMART CARDS Smart cards have an underlying OS, just like computers. A smart card OS handles file management, security I/O, command execution and provides an API (Application Programming Interface). Example operating systems are MULTOS (multos.com) and Java Card (java.sun.com/products/javacard) 22 APPLICATION OF SMART CARDS i. - - Growth of smart cards is driven by applications. Important applications include: Retail purchases Smart cards are more secure than credit cards and can be extended with other payment services. Used to speed up transactions and bring convenience. In stores, gas stations, fast-food and cinemas. E.g. e-purses and contactless payments 23 APPLICATION OF SMART CARDS - - e-purses is a smart card application. Money is loaded onto the card from the card holder’s account. Account is debited and the value transferred at the bank or system operator. Transaction is PIN protected. Whenever used the value in the e-purse is adjusted. Behind the scenes the e-purse host system debits the account of the issuing bank and credits the merchant’s account. 24 APPLICATION OF SMART CARDS - i. - e-purse can only be used to conduct business on the terminal within its host system. The Common Electronic Purse Specification (CEPS) is designed to standardize and achieve global interoperability among varied e-purse offerings. Transit fares Use of cash and multiple tickets is a hassle for commuters SmarTrip is an example smart card used in the transportation system. (in the US) 25 APPLICATION OF SMART CARDS - i. - - - It is a permanent, contactless, rechargeable fare card that can hold up to $300 in fare value. E-Identification They have a capability to store personal information; pictures, biometric identifiers, digital signatures, and private security keys. For this reason they are used for identification, access control and authentication applications. Countries are launching a national ID smart card. 26 APPLICATION OF SMART CARDS - - China rolled out its pilot ID program in 2004 The cards reduced widespread forging of ID papers. Chinese could also move freely into the country. Size of the card will be the same as a bank card and will use contact less chips. Other countries with e-ID initiatives are Belgium, India and USA. 27 APPLICATION OF SMART CARDS i. - Health care They have a functional possibility to be used. This includes: Storing vital info. in case of emergencies Preventing patients from obtaining multiple prescriptions from different physicians. Verifying patients identity and insurance coverage Speeding up the payment and claims process. 28 APPLICATION OF SMART CARDS - - health-care smart cards have large data storage capability (e.g., storing vital medical information) Germany and France have the largest health – care programs in the world. Health care uses PKI to secure access to health-care data stored on networks. Smart cards then do not only contain encrypted keys but also pointers to data that may be housed in different databases on different networks. 29 APPLICATION OF SMART CARDS Due to privacy and civil liberties people are hesitant about having their personal data mixed with other data on the same card. Securing smart cards Smart cards store or provide access to either valuable assets (e-cash) or sensitive info (medical records) They must be secured against theft, fraud or misuse. Smart cards are more secure than payment cards. (CVN is clearly visible) 30 - APPLICATION OF SMART CARDS Before a smart card is used the holder may be required to enter a PIN that is matched with the card. They encrypt and decrypt downloaded data or read from the card. Hacking a smart card is classified as a “class 3” attack, which means the cost of compromising the card far exceeds the benefits. 31