I think one of the analysis done by the x9a10 comittee was about end-to-end
security with flow thru transaction protocols effectively the current
web, POS, non-web, etc message path sequence but with the transaction
carrying end-to-end consumer authentication of the message (aka the x9.59
Thanx Lynn,
But I don't understand if you are supporting my view or not :-)
In case it was against, I think you should take a deep look on 3D to
verify that it is as far from end-to-end that is technically possible.
The widely used method I suggested, is definitely end-to-end
in my opinion