The Open Card Forum discussion over the last week has been very 
interesting, and has illuminated numerous corners of the business of
implementing terminals for debit/credit applications. In the glow of
these contributions, some of the simplicity of today's debit/credit
cards has been seen clearly. Up till now, the only specifications for
debit/credit terminals have been the EMV specifications, the
derivative specifications coming separately from E, M and V, and the
national specifications (UKIS here in the UK being the only one
implemented so far). The OCF traffic has identified some ideas for
implementing different types of terminals, and also the contribution
from Thomas Schaeck has been useful, in that it shows how GeldKarte
takes a system design approach to card to card transfers over insecure
links. Other e-purse schemes also do this, notably Proton and Mondex.
Proton has not yet let me into the secrets of how it works. As for
Mondex, I am subject to NDA and cannot give details about it in
public.

But why do we have a problem? What do we want to do about it? And what
is the difference between e-purse and debit/credit?

The problem for debit/credit is security and reliability of all types
of transaction, at low cost. Security includes fraud and tampering.
Reliability includes loss of the transaction message and corruption of
the message. Corruption of the message and tampering with the message
both render it equally useless. Cost includes capital cost of the
equipment as well as transmission and processing cost for the
transaction.

The difference between debit/credit and e-purse is not always easy to
see. At one extreme, debit/credit starts with a card and creates a
transaction message. The message makes its way to the cardholder's
account (either in a bank or in a credit card company). The message
may be stored somewhere on the way, for forwarding later (offline
transactions). At the other extreme, many e-purse schemes carry out
card to card transfer directly between a user card and a merchant
card. Later, the e-purse transactions may be sent on to a card company
or bank account.

The basic way to process debit/credit at the point of sale is through
a dedicated terminal. This terminal has the card reader/writer slot, a
keypad, a display, a secure transaction message store, a data comms
interface, a printer, and possibly an external interface so that the
amount to be charged can be entered directly by the till. Because the
device is certified secure by the card scheme, the transactions are
guaranteed by the scheme and the transaction fee charged by the scheme
is low. The EMV and related specifications only describe this type of
terminal, and the type approval schemes only approve this type of
terminal.

>From the point of view of the merchant who wants to process
debit/credit through his till or till system in his retail store, with
the customer present, the problem is that the dedicated terminal is
expensive and is not easily integrated into his store system. He wants
a low cost 'front end' to accept the customer's card, he wants to
process the transaction through his till system, and he wants to store
the offline transaction messages at a place convenient to him - just
like he does with mag stripe transactions at the moment.

>From the point of view of the e-commerce user, he is not on the
merchant's premises and so his transaction is classed as 'cardholder
not present'. Thus the transaction is not guaranteed, and someone is
going to charge a large fee in order to, in effect, insure the
transaction. And the merchant may not even be given an account by an
acquirer unless he has a secure server (or rents a secure transaction
server's services) - that's expensive.

The task is (a) to design suitable low cost card accepting devices
which handle the user card but leave the rest of the transaction to be
handled in relatively insecure equipment (e.g. PCs), while still
maintaining the guarantee of non-repudiation for the merchant, and (b)
to make such modifications to the card specs as are required to assist
in making the card accepting device low cost. From a system point of
view, the retail store system and the remote e-commerce user pose the
same problem: how to ensure that the card authenticates the
transaction, independent of anything between the immediate vicinity of
the card on the one hand and the cardholder's account on the other
hand, with the card being sure that the amount of the transaction is
the amount authorised by the cardholder.

What we have seen this last week is that there are a variety of 
solutions. I am aware that there is also a project about to start in
this area, with the aim of developing yet another secure terminal. The
project is believed to be called FINREAD, has European Community
finance, and I have not been able to track it down, so can anyone give
me a contact name and email address for the organisations involved in
this project? What we do not have is any suitable specifications from
E, M or V, so at the moment we cannot develop such a terminal for
debit/credit with any confidence that it will pass type approval.

Some of the solutions to the problem are, we read, the subject of
patents, but that should not prevent them being made generally
available under the umbrella of, say, a European standard (see later).

I proposed one solution, which would fit well on the PC on my desk.
But that may not suit everyone. In particular, Europe asks us to be
very sure that we cater for people with special needs. In any case,
why should we just define a solution for debit/credit?
Multi-application cards are likely to have both debit/credit and
e-purse in them, so one terminal should be able to handle both types
of value transfer transaction, with security adeqaute for each scheme.

For the debit/credit transaction to be guaranteed, or for the e-purse
transaction not to affect the money supply, we need to have a security
model for the whole end to end transaction system: card, computer
systems for transaction processing, message store, data transmission,
maybe another card. That security model needs to have both the
mechanism for guaranteeing the transaction and a mechanism for
repairing the entire scheme if it is damaged (for example, fraud by
cloning of cards, or potential fraud opportunities by revealing of
secret keys). That security model has to assume that non-secure
devices are going to be used to process transactions - and thus the
cardholder's card number may be made public, but the security provided
by the card must ensure that that card number cannot be used without
the real cardholder's card being active.

Now that we are moving into a multi-application environment, I
propose that the basics of the transaction guarantee mechanism be
governed by public standards rather than by individual scheme
specifications. Since the EC is so keen on quality of service to the
public, and so keen on taking us forward into the information society,
so keen on enabling self-service for so many transactions, and so keen
on 'Design for All' (i.e. the special needs of some people, common
user interfaces for the ordinary person, and the enthusiasm of techno
gurus), it seems that the right place to co-ordinate all this is
within the EC, and within the EC the group to do it is the ICT
Standards Board (they sit above CEN and ETSI).


In summary, the retailer wants to process smart card transactions just
like he processes mag stripe transactions: through his PC-based system
or network. He wants more transactions offline, to reduce cost. The
card should be used to guarantee the transactions, not the terminal.
The e-commerce user wants a low cost way to use his card through the
web browser on his PC. Again, the card should guarantee the
transaction, not the terminal. One solution for the terminal hardware
is a secure PIN pad with card slot and display, configured as
described earlier, and designed so that the PC cannot alter what it
does. That solution requires the cards to be modified, and probably
all the solutions do - the debit/credit card spec will have to migrate
beyond EMV V3.1.1, and the UK will have to accept PIN at point of
sale. An overall standard, if properly crafted, will make possible a
variety of solutions to the problem.

Peter Tomlinson

Iosis, 4 Sommerville Road, Bristol BS7 9AA, UK
Phone +44 117 924 9231, fax +44 117 924 9233
Email [EMAIL PROTECTED], web www.iosis.co.uk
Visit the OpenCard Framework's WWW site at http://www.opencard.org/ for
access to documentation, code, presentations, and OCF announcements.
-----------------------------------------------------------------------------
To unsubscribe from the OCF Mailing list, send a mail to
"[EMAIL PROTECTED]" with the word "unsubscribe" in the BODY of the
message.

Reply via email to