Cryptographic authentication and tokenized transactions
11301844 · 2022-04-12
Assignee
Inventors
Cpc classification
H04L2209/56
ELECTRICITY
G06Q20/38215
PHYSICS
International classification
G06Q20/40
PHYSICS
Abstract
A cryptographic method of performing a tokenised transaction between a payment offering party and a payment accepting party is described. The tokenised transaction is mediated by a transaction scheme. The payment accepting party is provided with a merchant identity and a merchant certificate associated with that identity by the transaction scheme provider. The payment accepting party provides the merchant identity and transaction seed data to the payment offering party. The payment offering party validates the merchant identity and uses the merchant identity and the transaction seed data to generate a cryptogram for the tokenised transaction. The payment offering party provides the cryptogram to the payment accepting party for transmission to the transaction scheme provider for authorisation of the tokenised transaction. A suitable user computing device and merchant computing device for acting as payment offering party and payment accepting party respectively are also described.
Claims
1. A cryptographic method of performing a tokenised transaction between a payment offering party and a payment accepting party mediated by a transaction scheme provider, the method comprising: receiving, from the payment accepting party, transaction seed data and a merchant certificate that is registered with the transaction scheme provider and indicates a customer verification method; identifying the customer verification method indicated by the merchant certificate; performing the customer verification method identified from the merchant certificate; in response to successful performance of the customer verification method, generating a cryptogram for the tokenised transaction using the transaction seed data; and providing the cryptogram to the payment accepting party for transmission to the transaction scheme provider for authorisation of the tokenised transaction.
2. The method of claim 1, wherein the transaction seed data comprises a key associated with the merchant certificate.
3. The method of claim 1, wherein the transaction seed data comprises an unpredictable number.
4. The method of claim 1, further comprising providing issuer authentication status information to the payment accepting party to indicate whether a token for the tokenised transaction has been authenticated by an issuer associated with an account of the payment offering party.
5. The method of claim 4, wherein the providing the issuer authentication status information is provided in a message rather than in transaction data.
6. The method of claim 1, further comprising locking a token associated with the tokenised transaction for use only for a transaction with the payment accepting party.
7. The method of claim 6, wherein the transaction scheme provider determines whether the token is locked for use only with a transaction with the payment accepting party and uses this determination in providing transaction authorisation.
8. A user computing device, comprising a processor, a memory, and instructions stored on the memory that when executed by the processor direct the processor to at least: receive, from a payment accepting party, transaction seed data and a merchant certificate that is registered with a transaction scheme provider and indicates a customer verification method; identify the customer verification method indicated by the merchant certificate; perform the customer verification method identified from the merchant certificate; in response to successful performance of the customer verification method, generate a cryptogram for a tokenised transaction using the transaction seed data; and provide the cryptogram to the payment accepting party for transmission to the transaction scheme provider for authorisation of the tokenised transaction.
9. The user computing device of claim 8, wherein the transaction seed data comprises a key associated with the merchant certificate.
10. The user computing device of claim 8, wherein the transaction seed data comprises an unpredictable number.
11. The user computing device of claim 8, wherein the instructions further direct the processor to provide issuer authentication status information to the payment accepting party to indicate whether a token for the tokenised transaction has been authenticated by an issuer associated with an account of a payment offering party.
12. The user computing device of claim 11, wherein the providing the issuer authentication status information is provided in a message rather than in transaction data.
13. The user computing device of claim 8, further comprising locking a token associated with the tokenised transaction for use only for a transaction with the payment accepting party.
Description
BRIEF DESCRIPTION OF FIGURES
(1) Embodiments of the disclosure will now be described, by way of example, with reference to the accompanying figures, of which:
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
(10)
(11)
(12)
DESCRIPTION OF SPECIFIC EMBODIMENTS
(13) General and specific embodiments of the disclosure will be described below with reference to the figures.
(14)
(15) Normally, card schemes—payment networks linked to payment cards—are based on one of two models: a three-party model or a four-party model (adopted by the present applicant). For the purposes of this document, the four-party model is described in further detail below.
(16) The four-party model may be used as a basis for the transaction network. For each transaction, the model comprises four entity types: cardholder 110, merchant 120, issuer 130 and acquirer 140. In this model, the cardholder 110 purchases goods or services from the merchant 120. The issuer 130 is the bank or any other financial institution that issued the card to the cardholder 110. The acquirer 140 provides services for card processing to the merchant 120.
(17) The model also comprises a central switch 150—interactions between the issuer 130 and the acquirer 140 are routed via the switch 150. The switch 150 enables a merchant 120 associated with one particular bank acquirer 140 to accept payment transactions from a cardholder 110 associated with a different bank issuer 130.
(18) A typical transaction between the entities in the four-party model can be divided into two main stages: authorisation and settlement. The cardholder 110 initiates a purchase of a good or service from the merchant 120 using their card. Details of the card and the transaction are sent to the issuer 130 via the acquirer 140 and the switch 150 to authorise the transaction. Should the transaction be considered abnormal by the issuer 130, the cardholder 110 may be required to undergo an additional verification process to verify their identity and the details of the transaction. Once the additional verification process is complete the transaction is authorised.
(19) On completion of the transaction between the cardholder 110 and the merchant 120, the transaction details are submitted by the merchant 120 to the acquirer 140 for settlement.
(20) The transaction details are then routed to the relevant issuer 130 by the acquirer 140 via the switch 150. Upon receipt of these transaction details, the issuer 130 provides the settlement funds to the switch 150, which in turn forwards these funds to the merchant 120 via the acquirer 140.
(21) Separately, the issuer 130 and the cardholder 110 settle the payment amount between them. In return, a service fee is paid to the acquirer 140 by the merchant 120 for each transaction, and an interchange fee is paid to the issuer 130 by the acquirer 140 in return for the settlement of funds.
(22) In practical implementations of a four-party system model, the roles of a specific party may involve multiple elements acting together. This is typically the case in implementations that have developed beyond a contact-based interaction between a customer card and a merchant terminal to digital implementations using proxy or virtual cards on user computing devices such as a smart phone.
(23)
(24) The cardholder 1 uses their computing device—which may be any or all of a cellular telephone handset, a tablet, a laptop, a static personal computer or any other suitable computing device (here a cellular telephone handset or smartphone 11 is shown)—to act either as a proxy for a physical payment card 6 or as a virtual payment card operating only in a digital domain. The smartphone 11 achieves this with a mobile payment application and a digital wallet, as described below. The smart phone 11 is thus able to transact with a merchant POS terminal 7 using NFC or another contactless technology. The smartphone 11 may also be able to interact with a merchant server 12 representing the merchant 2 over any appropriate network connection, such as the public internet.
(25) The transaction scheme infrastructure (transaction infrastructure) 5 provides not only the computing infrastructure necessary to operate the card scheme and provide routing of transactions and other messaging to parties such as the acquirer 3 and the issuer 4, but also a wallet service 17 to support a digital wallet on the cardholder computing device, and an internet gateway 18 to accept internet based transactions for processing by the transaction infrastructure. In other embodiments, the wallet service 17 may be provided similarly by a third party with an appropriate trust relationship with the transaction scheme provider. To support tokenisation, a token service provider 19 is present (again, this is shown as part of transaction infrastructure 5 but may be provided by a third party with appropriate trust relationships), and the transaction scheme infrastructure provides a digital enablement service 16 to support the performance of tokenised digital transactions, and to interact with other elements of the system to allow transactions to be performed correctly.
(26) For a tokenised transaction, the transaction is validated in the transaction scheme by mapping the cardholder token to their card PAN, checking the status of the token (to ensure that it is in date and otherwise valid) and any customer verification approach used. This allows the issuer to authorise the transaction in the normal manner.
(27)
(28)
(29)
(30) A general embodiment of a method according to the disclosure is illustrated schematically in
(31)
(32) This allows, for example, for a merchant to indicate it does not wish for a consumer verification to be performed and is willing to accept the risk associated if the transaction was later found out to be fraudulent. Merchants can receive and verify transactional information from the wallet.
This allows merchants to provide an optimized user experience. For example, the wallet could inform the merchant whether a consumer verification was performed, and whether the consumer verification involved the card issuer and therefore the transaction may benefit from a liability shift from merchant to issuer. If a consumer verification was not performed, the merchant may choose to additionally perform a cardholder authentication process such as SecureCode after receiving the token transaction data from the wallet. The payment network (or the token service provider) can if desired lock the use of a specific token within a wallet to a specific merchant.
(33) This further improves the security of payment tokens by ensuing that possible data breaches involving the theft of tokens held by merchants may not be submitted by a fraudulent merchant to perform transactions.
(34) Implementations of aspects of the disclosure are described in respect of the present applicant's Digital Secure Remote Payment (DSRP) payment solution. This payment solution allows Card Not Present merchants to benefit from the dynamic transaction data generated by mobile payment applications using tokenisation. A Card Not Present merchant is a merchant transacting with an entity other than a physical card in such a way that the merchant cannot take assurance from the use of the customer's physical card at a merchant terminal. DSRP is used in association with tokenized cards enabled by the Mastercard Digital Enablement Service (MDES). Digital Secure Remote Payment transactions contain dynamic data (cryptograms) generated using EMV-based cryptography by a mobile payment application to secure the transaction. Digital Secure Remote Payment transactions require cardholder authentication, and include dynamic data to provide evidence that cardholder authentication has been performed. Digital Secure Remote Payment transactions can be initiated from any device that can perform cardholder authentication including mobile devices and properly secured web-based implementations.
(35) These transactions include typical mobile e-commerce scenarios where the cardholder is using either the mobile browser or a specific merchant application to purchase goods and/or services. While aspects of the disclosure are described in relation to embodiments employing DSRP and MDES, they are not limited to these technologies and may be used in embodiments employing tokenised cards enabled by a different enablement service and using a different payment solution.
(36) Five new concepts that can be used to enhance Digital Secure Remote Payment (DSRP) or any similar payment solution when transacting with an authenticated merchant are described below. These are as follows, and are each described in detail below. Merchant Authentication Process Authenticated Unpredictable Number Delivery Channel Locking using an authentication model Merchant Driven User Experience Issuer Authentication Status for Merchant
(37) A process used to authenticate a merchant and generate a merchant certificate is described. A unique identifier is assigned to an authenticated merchant (in embodiments, this is given the term Mastercard Authenticated Accepter ID, or MAAID). The term merchant is used in the context of a person or organization that can accept a transaction scheme card and then directly or indirectly initiate a transaction.
(38) Authenticated delivery of information can be used to improve the security of the payment solution and may be used further for channel locking—a solution for ensuring a token's use may be limited to a specific merchant's transaction.
(39) The channel locking process uses an authentication model to let:
(40) 1. The scheme provider to authenticate the merchant
(41) 2. The wallet to authenticate the merchant
(42) 3. The authorization system to authenticate the wallet/payment application
(43) 4. The wallet to authenticate the consumer
(44) The Authorization system is able to check that: The consumer was verified by the wallet The transaction was performed using an authenticated merchant authenticated by a wallet/payment application using a genuine token
(45) In at least one embodiment, the merchant can drive the user experience of the wallet while delivering information in a secure way between the merchant and the wallet. In this way the merchant can adjust the payment experience of the consumer depending on the type of purchase performed and the availability of a consumer verification process at level of the merchant.
(46) A solution is provided to simplify the integration of Issuer Authenticated transactions with the merchant environment by allowing the merchant to trust an Issuer Authentication Status delivered by the payment application prior to submitting a transaction. This may assist the merchant on whether to invoke an alternate cardholder authentication mechanism, such as SecureCode, if he wishes to benefit from possible fraud liability shift for the transaction.
(47) The solutions described in this document do not require any changes for the Acquirer and the Issuer. There are technological changes defined for the merchant, these are used to improve the security of the payment solution transactions and additionally give the opportunity for liability shift to be granted to authenticated merchants, providing them with a significant practical benefit. The payment application may extend existing processes in order to integrate additional features provided here.
(48) The merchant authentication process is split into two parts: determination that the merchant is a genuine merchant able to accept transaction scheme brands; and generation of a Merchant Certificate to be delivered to the genuine merchant.
(49)
(50) The steps of the process are as follows:
(51) 1. The merchant applies (601) to the transaction scheme to be registered as an Authenticated Merchant.
(52) 2. The transaction scheme delivers (602) a payment token to the merchant.
(53) 3. The merchant uses (603) the token to perform one online transaction.
(54) 4. The transaction scheme online authorization system validates (604) the transaction.
(55) The successful validation of the transaction is used to confirm that the merchant is a genuine merchant eligible to receive a Merchant Certificate. In other embodiments, manual, paper-based or form-based processes may also be used to determine merchant eligibility.
(56)
(57) A Genuine Merchant is eligible to receive a merchant certificate. The steps of the process are as follows:
(58) 1. The transaction scheme assigns (701) a unique identifier (here, a Mastercard Authenticated Accepter ID or MAAID) to the merchant which has successfully completed the Genuine Merchant process. The MAAID may be already defined independently of the tokenized transaction performed by the genuine merchant. In embodiments, the MAAID is a 16-byte Globally Unique Identifier (GUID) to ensure uniqueness
(59) 2. The transaction scheme can assign/define additional fields/data elements that are specific to this merchant. Optionally, the merchant can also contribute to the definition of some data elements.
(60) 3. The merchant is provided (702) with a key pair (to enable participation in a public key infrastructure—PKI) using for example one of the following methods: The transaction scheme key management services can generate the key pair (PKI) on behalf of the merchant The process can be automated in order to avoid any manual process when managing keys and certificates The process can be under the control of key management services resources The merchant can generate its own key pair.
(61) The merchant can upload any required information to a transaction scheme portal or any other method can be used to deliver information to transaction scheme key management services. In embodiments, the process uses any appropriate agreed cryptographic method and key type, such as RSA or ECC.
(62) 4. The transaction scheme prepares a certificate signing request (CSR) containing all the information to be signed by transaction scheme key management services. In embodiments, the merchant can prepare the certificate signing request (CSR) and deliver it using a transaction scheme provider portal or any other method.
(63) 5. Transaction scheme key management services use a Certification Authority to generate (703) the merchant certificate. Note that the merchant certificate must include the MAAID.
(64) 6. The transaction scheme then generates (704) a container for the merchant. If the transaction scheme has generated the key pair on behalf of the merchant then the transaction scheme provider can generate an archive file format (using for example PKCS #12) in order to bundle the generated key pair, the merchant certificate and all the members of a chain of trust. If the key was generated by the merchant then the transaction scheme can generate a list of certificates (using for example PKCS #7) in order to bundle the merchant certificate and all the members of a chain of trust Note that the transaction scheme can also include additional certificates in the container such as certificate used to validate certificate associated to the token and the issuer of the token (See discussion of Issuer Authentication Status below)
(65) 7. The transaction scheme delivers (705) the container to the merchant.
(66) 8. The merchant receives the container.
(67) 9. The merchant authentication process is completed with the following post-conditions: The merchant has a key pair (PKI) The merchant has a merchant certificate and the related chain of trust The merchant has a chain of trust that can be used to validate a certificate associated to a token (ICC Key Pair and Issuer (TSP) Certificate) The merchant has a merchant unique identifier (MAAID).
(68)
(69) The basic description of this process as used for a DSRP transaction is as follows:
(70) 1. The merchant generates an unpredictable number (UN) as part of a DSRP transaction.
(71) 2. The UN is sent to the wallet via an API between the merchant and the wallet.
(72) 3. The wallet contains a token, either within a hardware device within the same device or as software within the device or on a server.
(73) 4. The UN is used as part of the generation of the cryptogram(s).
(74) 5. The wallet returns the cryptogram(s) to the merchant.
(75) 6. The cryptogram(s) is(are) sent as part of a DSRP transaction for online authorization (using fields DE55 or DE48 as defined in EMV specifications).
(76) An authenticated Unpredictable Number (UN) delivery cryptographically binds the delivery of the UN with the Mastercard Authenticated Accepter ID associated with the merchant. The authenticated Unpredictable Number (UN) delivery process is split into two parts:
(77) A. The operations performed by the Merchant=Merchant Processing
(78) B. The operations performed by the Wallet=Wallet Processing
(79) Authenticated UN Delivery—Merchant Processing
(80) The merchant has to deliver an authenticated Unpredictable Number (UN).
(81) The steps of the process are as follows:
(82) 1. The merchant requests (801) a challenge providing the MAAID
(83) 2. The wallet receives the request and generates a challenge (4 bytes)
(84) 3. The wallet stores the challenge and the MAAID
(85) 4. The wallet returns (802) the challenge to the merchant
(86) 5. The merchant generates (803) the Unpredictable Number (UN)
(87) 6. The merchant uses their private key (delivered using the container or generated by the merchant as discussed above) to sign (805) the following message:
(88) MSG:=Unpredictable Number|Challenge|Mastercard Authenticated Accepter ID
(89) where | is the concatenation operator
(90) 7. The merchant can also use the message to carry information (804) about the user experience in the transaction as discussed further below.
(91) 8. There are several options to protect the message
(92) I. Sign the message with signature recovery
(93) Note that the small size of the message (24 bytes comprising a 4 bytes UN, a 4 bytes challenge and a 16-byte value for the MAAID) allows the information to fit inside the modulus.
(94) II. Sign the message
(95) III. Encrypt and sign the message
(96) 9. The merchant delivers (806) the following elements as part of the request sent to the Wallet to generate DSRP cryptogram(s):
(97) a. Data (one of the following options as set out in 8)
(98) I. Signature generated with message recovery
(99) II. Message and signature
(100) III. Encrypted message and signature
(101) b. Merchant certificate
(102) Authenticated UN Delivery—Wallet Processing
(103) The wallet has to authenticate the Unpredictable Number (UN). As a pre-requisite the wallet must have access to the transaction scheme CA public keys and the related chain of trust.
(104) The steps of the process are as follows:
(105) 1. The wallet receives the following elements as part of the request sent by the merchant (or by any gateway used to trigger the DSRP process):
(106) a. Data (as discussed above)
(107) I. Signature generated with message recovery
(108) II. Message and signature
(109) III. Encrypted message and signature
(110) b. Merchant certificate
(111) 2. The wallet validates (807) the merchant certificate using the transaction scheme Public Key. Use of a Certificate Revocation List (CRL) or an Online Certificate Status Protocol (OCSP) is optional as any revoked merchant will be identified as part of the online authorization, and the related token and/or MAAID will be revoked or suspended
(112) 3. Upon successful validation of the merchant certificate the Wallet validates the signature and recovers (808) the original message constructed by the merchant:
(113) MSG:=Unpredictable Number|Challenge|Mastercard Authenticated Accepter ID
(114) Note that the use of signature with message recovery provides the assurance that the payment application has performed the validation of the signature generated by the merchant.
(115) In this way the wallet can access the value of the Unpredictable Number (UN), the challenge and the MAAID.
(116) The assurance is an implicit cryptographic proof that becomes explicit when the Unpredictable Number (UN) and the MAAID are used by the payment application (used by the wallet) to generate the application cryptogram(s) as discussed further below
(117) 4. The wallet checks (809) the value of the MAAID contained in the message against the MAAID defined in the merchant certificate.
(118) 5. Upon successful validation of the MAAID the wallet can check (810) the challenge.
(119) 6. Upon successful validation of the challenge (associated with the MAAID for the transaction) the wallet can use the authenticated Unpredictable Number (UN) and the MAAID for channel locking using an authentication model, as discussed further below.
(120) 7. The wallet can also retrieve information about the user experience proposed by the merchant to be applied as discussed further below.
(121) 8. The authenticated Unpredictable Number (UN) delivery process is completed with the following post-conditions: The delivery was done in the context of a challenge/response process (=freshness) The wallet has the authenticated Unpredictable Number (UN) generated by the merchant The wallet has the MAAID of the merchant
(122)
(123) Again, an exemplary process will be described as used in DSRP transaction as follows:
(124) 1. The merchant generates an unpredictable number (UN) as part of a DSRP transaction
(125) 2. The UN is sent to the wallet and used as part of the application cryptogram(s) generation
(126) The UN is used to achieve the channel locking mechanism in connection with authentication and authorisation processes. The authentication model used in this process is as follows:
(127) 1. The transaction scheme is able to authenticate the merchant using the processes described above.
(128) 2. The wallet is able to authenticate the merchant using the signature process described above for authenticated Unpredictable Number delivery.
(129) 3. The authorization system is able to authenticate the wallet/payment Application (card authentication method—CAM) using cryptogram(s) validation in accordance with EMV specifications and processes.
(130) 4. The wallet is able to authenticate the consumer using a cardholder verification method (CVM) such as CDCVM (Consumer Device Cardholder Verification Method) or any equivalent method, again in accordance with EMV specifications and protocols.
(131) The authorization system is able to check that consumer was verified by the wallet using cryptogram(s) validation when CDCVM was performed and that this was successful using Card Verification Results (CVR) information available from transaction information.
(132) Using this approach, the authorization system is able to validate that the transaction was performed using an authenticated merchant authenticated by a wallet provider using a genuine token to deliver “Card” and “Consumer” authentication as the UN and the MAAID are part of the data used as input for cryptogram(s) generation.
(133) This authentication model is used for channel locking. The full approach may be considered in three parts, each described in more detail below:
(134) A. The operations performed by the wallet/payment application=Wallet/Payment Application Processing
(135) B. The operations performed by the merchant=Merchant Processing
(136) C. The operations performed by the authorization system=Authorization System Processing
(137) Channel Locking—Wallet/Payment Application Processing
(138) The wallet uses the payment application to generate application cryptogram(s) in the context of a DSRP transaction. The payment application binds the application cryptogram(s) with the authenticated Unpredictable Number and the MAAID.
(139) When performing a DSRP transaction the list of data used as input for application cryptogram(s) generation is set out in Table 1 below. Where terminology is not expressly defined in this document, it is described and defined in appropriate EMV specifications, as will be appreciated by the person skilled in the art.
(140) TABLE-US-00001 TABLE 1 Input data for DSRP transaction Data object Size (bytes) Amount, Authorized (Numeric) 6 Amount, Other (Numeric) 6 Terminal Country Code 2 Terminal Verification Results 5 (TVR) Transaction Currency Code 2 Transaction Date 3 Transaction Type 1 Unpredictable Number (UN) 4 Application Interchange Profile 2 (AIP) Application Transaction Counter 2 (ATC) Card Verification Results (CVR) 6
(141) The steps of the process are as follows:
(142) 1. The wallet is responsible for the verification (901) of the consumer. Optionally, the merchant can play a role in the user experience of the wallet by adjusting the verification process according to merchant preferences delivered as part of the information carried in the merchant certificate as described above.
(143) 2. The wallet provides the outcome of the verification of the consumer to the payment application.
(144) 3. The payment application generates (902) the application cryptogram(s) using the standard list of data including the Unpredictable Number and the MAAID recovered as part of the authenticated Unpredictable Number delivery process. a. The MAAID can be an additional information item in the data used as input for application cryptogram(s) generation using an updated CDOL (indicating a list of data to be delivered in the context of an EMV transaction) for a DSRP transaction or any equivalent method when a kernel or other command is used to generate the application cryptogram(s) in the context of a DSRP transaction. b. The MAAID may be embedded in the data used as input for application cryptogram(s) generation as the value of one or several elements in the existing list of data used as input for AC (application cryptogram) generation.
(145) 4. The wallet can perform additional operations (903) described below in relation to Issuer Authentication Status prior to delivery of the response to the merchant
(146) 5. The wallet delivers (904) the DSRP data (including the application cryptogram(s)) back to the merchant. When the authenticated merchant uses tokens that are locked to the merchant, there is no need for the wallet to send back the MAAID to the merchant.
(147) Channel Locking—Merchant Processing
(148) The merchant is the interface between the wallet and the Acquiring system. The steps of the process performed by the merchant are as follows:
(149) 1. The merchant receives the DSRP data as part of the response sent by the wallet.
(150) 2. The merchant can perform additional operations described below in respect of Issuer Authentication prior to submitting the transaction for online authorization
(151) 3. The merchant prepares (905) the information for online authorization of the transaction including: a. The Unpredictable Number generated by the merchant as part of the authenticated Unpredictable Number delivery process. b. The content of the DSRP data received from the wallet.
(152) 4. The merchant delivers the transaction data to the Acquiring system for online authorization. An authenticated merchant using tokens locked to the merchant does not need to provide the MAAID as part of the transaction data to be used for the online authorization message. The MAAID can be retrieved by the authorization system using the attributes of the token (as it is locked to the merchant). An authenticated merchant not using tokens locked to the merchant must provide the MAAID as part of the transaction data to be used for the online authorization message
(153) Channel Locking—Authorization System Processing
(154) The authorization system is responsible for the validation of the DSRP transaction. The mechanism described here supports (but does not require) the concept of channel locking. The steps of the process performed by the authorization system are as follows:
(155) 1. The authorization system receives (906) the transaction data for validation.
(156) 2. The authorization system must retrieve the MAAID. When using tokens locked to a merchant the identifier is retrieved from the information associated with the token used for the transaction. The MAAID may be defined as an attribute of the tokens delivered as part of digital enablement services the information is stored in the database of a token service provider. When the tokens are not locked to a merchant, the MAAID is delivered by the merchant as part of the online authorization message.
(157) 3. The authorization system validates (907) that: a. The MAAID is eligible for the service (for example, for channel locking) b. The credentials of the merchant are still valid (for example, that the merchant certificate has not been revoked) c. The token is valid and has not been suspended
(158) 4. The authorization system validates the application cryptogram(s) of the transaction using among other criteria the unpredictable number retrieved as part of the online authorization message and the MAAID retrieved for example from the token service provider database.
(159) 5. The successful validation of the cryptogram completes the process.
(160)
(161) A merchant using a login process to let a user access the merchant website hosted on merchant server 12 to shop prior to the checkout and payment transaction process could obtain a merchant certificate which permits a liability shift, and which could allow the authentication of the user on the device to be bypassed (CDCVM bypass) as the authentication of the user has already been done on the merchant website in such a way that it may also be considered valid for the payment transaction.
(162) As shown in
(163)
(164) This AIP value is a static value that is part of the card profile associated with the token.
(165) Using existing transaction flows, a merchant looking to know whether the DSRP transaction is Issuer-Authenticated or not would have to retrieve the value of the AIP considering that the process is dependent of the method used to deliver DSRP data to the merchant using either DE55 or DE48 (Universal Cardholder Authentication Field—UCAF). Specific UCAF formats may be defined by transaction scheme providers. Once the AIP value is retrieved by the merchant, the latter must parse the value (2 bytes) in order to retrieve the AIP byte 2, bit 6.
(166) Using embodiments of the disclosure, Issuer Authentication Status can be determined by the wallet/payment application based on token information (using the Issuer-Authenticated capable flag defined using AIP byte 2, bit 6). An Issuer Authenticated transaction means that the Issuer has participated or had the opportunity to verify the cardholder. The Issuer Authentication Status is used to report that the consumer is the cardholder.
(167) The management of the Issuer Authentication Status is split into two parts:
(168) A. The operations performed (1101) by the wallet/payment Application=Wallet/Payment Application Processing. These comprise using the card and the chain of trust to obtain Issuer Authentication Status, and to generate and sign an appropriate message, with the message and card and issuer certificates provided for delivery to the merchant.
(169) B. The operations performed (1102) by the merchant=Merchant Processing. These comprise receiving the information delivered by the wallet and payment application, validating the issuer and the card certificates using the chain of trust, validating signatures and recovering message data including Issuer Authentication Status.
(170) Note that the introduction of the Issuer Authentication Status must be seen as an additional feature compared to the use of the AIP byte 2, bit 6. When using this solution the merchant does not need to parse the payment data in order to retrieve the Issuer Authentication Status.
(171) As the person skilled in the art will appreciate, modifications and variations to the above embodiments may be provided, and further embodiments may be developed, without departing from the spirit and scope of the disclosure. Reference to standards and proprietary technologies are provided for the purpose of describing effective implementations, and do not limit the scope of the disclosure.