The Open Card Forum discussion over the last week has been very 
interesting, and has illuminated numerous corners of the business of 
implementing terminals for debit/credit applications. In the glow of 
these contributions, some of the simplicity of today's debit/credit 
cards has been seen clearly. Up till now, the only specifications for 
debit/credit terminals have been the EMV specifications, the 
derivative specifications coming separately from E, M and V, and the 
national specifications (UKIS here in the UK being the only one 
implemented so far). The OCF traffic has identified some ideas for 
implementing different types of terminals, and also the contribution 
from Thomas Schaeck has been useful, in that it shows how GeldKarte 
takes a system design approach to card to card transfers over 
insecure links. Other e-purse schemes also do this, notably Proton 
and Mondex. Proton has not yet let me into the secrets of how it 
works. As for Mondex, I am subject to NDA and cannot give details 
about it in public.

But why do we have a problem? What do we want to do about it? And 
what is the difference between e-purse and debit/credit?

The problem for debit/credit is security and reliability of all types 
of transaction, at low cost. Security includes fraud and tampering. 
Reliability includes loss of the transaction message and corruption 
of the message. Corruption of the message and tampering with the 
message both render it equally useless. Cost includes capital cost of 
the equipment as well as transmission and processing cost for the 
transaction.

The difference between debit/credit and e-purse is not always easy
to see. At one extreme, debit/credit starts with a card and creates
a transaction message. The message makes its way to the cardholder's
account (either in a bank or in a credit card company). The message
may be stored somewhere on the way, for forwarding later (offline
transactions). At the other extreme, many e-purse schemes carry out
card to card transfer directly between a user card and a merchant
card. Later, the e-purse transactions may be sent on to a card 
company or bank account.

The basic way to process debit/credit at the point of sale is through 
a dedicated terminal. This terminal has the card reader/writer slot, 
a keypad, a display, a secure transaction message store, a data comms 
interface, a printer, and possibly an external interface so that the 
amount to be charged can be entered directly by the till. Because the 
device is certified secure by the card scheme, the transactions are 
guaranteed by the scheme and the transaction fee charged by the 
scheme is low. The EMV and related specifications only describe this 
type of terminal, and the type approval schemes only approve this 
type of terminal.

>From the point of view of the merchant who wants to process
debit/credit through his till or till system in his retail store, 
with the customer present, the problem is that the dedicated terminal 
is expensive and is not easily integrated into his store system. He 
wants a low cost 'front end' to accept the customer's card, he wants 
to process the transaction through his till system, and he wants to 
store the offline transaction messages at a place convenient to him - 
just like he does with mag stripe transactions at the moment.

>From the point of view of the e-commerce user, he is not on the
merchant's premises and so his transaction is classed as 'cardholder 
not present'. Thus the transaction is not guaranteed, and someone is 
going to charge a large fee in order to, in effect, insure the 
transaction. And the merchant may not even be given an account by an 
acquirer unless he has a secure server (or rents a secure transaction 
server's services) - that's expensive.

The task is (a) to design suitable low cost card accepting devices 
which handle the user card but leave the rest of the transaction to 
be handled in relatively insecure equipment (e.g. PCs), while still 
maintaining the guarantee of non-repudiation for the merchant, and 
(b) to make such modifications to the card specs as are required to 
assist in making the card accepting device low cost. From a system 
point of view, the retail store system and the remote e-commerce user 
pose the same problem: how to ensure that the card authenticates the 
transaction, independent of anything between the immediate vicinity 
of the card on the one hand and the cardholder's account on the other 
hand, with the card being sure that the amount of the transaction is 
the amount authorised by the cardholder.

What we have seen this last week is that there are a variety of 
solutions. I am aware that there is also a project about to start in 
this area, with the aim of developing yet another secure terminal. 
The project is believed to be called FINREAD, has European Community 
finance, and I have not been able to track it down, so can anyone 
give me a contact name and email address for the organisations 
involved in this project? What we do not have is any suitable 
specifications from E, M or V, so at the moment we cannot develop 
such a terminal for debit/credit with any confidence that it will 
pass type approval.

Some of the solutions to the problem are, we read, the subject of 
patents, but that should not prevent them being made generally 
available under the umbrella of, say, a European standard (see 
later).

I proposed one solution, which would fit well on the PC on my desk. 
But that may not suit everyone. In particular, Europe asks us to be 
very sure that we cater for people with special needs. In any case, 
why should we just define a solution for debit/credit? 
Multi-application cards are likely to have both debit/credit and 
e-purse in them, so one terminal should be able to handle both types 
of value transfer transaction, with security adeqaute for each 
scheme.

For the debit/credit transaction to be guaranteed, or for the e-purse 
transaction not to affect the money supply, we need to have a 
security model for the whole end to end transaction system: card, 
computer systems for transaction processing, message store, data 
transmission, maybe another card. That security model needs to have 
both the mechanism for guaranteeing the transaction and a mechanism 
for repairing the entire scheme if it is damaged (for example, 
fraud by cloning of cards, or potential fraud opportunities by 
revealing of secret keys). That security model has to assume that 
non-secure devices are going to be used to process transactions - and 
thus the cardholder's card number may be made public, but the 
security provided by the card must ensure that that card number 
cannot be used without the real cardholder's card being active.

Now that we are moving into a multi-application environment, I
propose that the basics of the transaction guarantee mechanism be
governed by public standards rather than by individual scheme
specifications. Since the EC is so keen on quality of service to the
public, and so keen on taking us forward into the information
society, so keen on enabling self-service for so many transactions,
and so keen on 'Design for All' (i.e. the special needs of some
people, common user interfaces for the ordinary person, and the 
enthusiasm of techno gurus), it seems that the right place to 
co-ordinate all this is within the EC, and within the EC the group to 
do it is the ICT Standards Board (they sit above CEN and ETSI).


In summary, the retailer wants to process smart card transactions 
just like he processes mag stripe transactions: through his PC-based 
system or network. He wants more transactions offline, to reduce 
cost. The card should be used to guarantee the transactions, not the 
terminal. The e-commerce user wants a low cost way to use his card 
through the web browser on his PC. Again, the card should guarantee 
the transaction, not the terminal. One solution for the terminal 
hardware is a secure PIN pad with card slot and display, configured 
as described earlier, and designed so that the PC cannot alter what 
it does. That solution requires the cards to be modified, and 
probably all the solutions do - the debit/credit card spec will have 
to migrate beyond EMV V3.1.1, and the UK will have to accept PIN at 
point of sale. An overall standard, if properly crafted, will make 
possible a variety of solutions to the problem.

Peter Tomlinson

Iosis, 4 Sommerville Road, Bristol BS7 9AA, UK
Phone +44 117 924 9231, fax +44 117 924 9233
Email [EMAIL PROTECTED], web www.iosis.co.uk

Visit the OpenCard Framework's WWW site at http://www.opencard.org/ for
access to documentation, code, presentations, and OCF announcements.
-----------------------------------------------------------------------------
To unsubscribe from the OCF Mailing list, send a mail to
"[EMAIL PROTECTED]" with the word "unsubscribe" in the BODY of the
message.

Reply via email to