How Does HCE Address the EMV Goals?
Not a day goes by without new mobile payment apps popping up or the Original Equipment Manufacturers, also called OEMs, launching their own mobile wallets (Apple Pay, Samsung Pay, Android Pay) in additional countries. Especially Switzerland plays an interesting role by focusing on the payment solution TWINT to solve the local mobile payment needs. However, regardless of the payment app and underlying technology, all solutions need to balance usability and security in order to justify a valid business case.
This article introduces Host Card Emulation (HCE) as the standard technology stack for your Android-based payment app and addresses how it meets the main EMV (Europay International, MasterCard and VISA) goals to ensure secure payments at the Point of Sale (POS).
Understanding the role of Host Card Emulation
HCE is the term used to describe the entire ecosystem of mobile payment solutions on Android-based devices, which do not have access to a Secure Element (SE) or a Trusted Execution Environment (TEE). Usually, SE and TEE rely on proprietary hardware security to store and access sensitive keys such as the Card Master Key (CMK), whereas HCE solves this by using mobile device software in combination with a remote server.
There are various stakeholders in the HCE ecosystem, which play an important part in providing a seamless and secure payment experience to the cardholder. Ranging from a secure payment app that builds the user interface to initiate a mobile payment, to a trusted Wallet Service Provider (WSP), and finally a Tokenization Service Provider (TSP) that replaces the PAN with a payment token (DPAN).
Whenever we think of Host Card Emulation, we tend to focus on transaction flows rather on what “card emulation” actually stands for. The secure payment app is the equivalent to the card program that runs on the plastic card’s contact chip. As a result, the payment app ensures that a valid EMV transaction is sent to the Near Field Communication (NFC) reader at the Point of Sale.
As EMV transactions evolved towards being recognized as the more secure solution compared to magnetic stripe based payments, all HCE participants, such as software and hardware vendors, card issuers and card schemes, have aimed for the same security levels and market acceptance.
Does HCE live up to the EMV standards?
The main goals of EMV are to reduce fraud by the following measures:
- Validating authentication of payment card (chip),
- requesting cardholder verification,
- validating transaction integrity, and
- using risk management parameters.
Validating authentication of payment card (chip):
This means it should not be possible to copy a payment card or compromise the application programs on the chip. How can HCE solve this issue?
- After installing on the mobile device, each payment app has its unique instance ID.
- Registering the payment app on the device includes the storage of a device fingerprint at the HCE wallet server.
- The provisioning of a payment token to the software/hardware key store of a mobile device results in a unique combination of payment app instance ID, device fingerprint, and DPAN.
- Before replenishing limited-use Session Keys (SKs), the HCE wallet server validates the combination of the provisioned payment token, payment app instance ID, and device fingerprint.
In essence, the previous described steps make it difficult for a fraudster to request valid SKs from the HCE wallet server for a payment app that resides on a different device.
Requesting cardholder verification
You should be able to confirm that you are the cardholder by a method that is either dependent on the POS, transaction amount or other attributes. EMV allows several Cardholder Verification Methods (CVMs): Cardholder’s signature comparison by the merchant, validation of the PIN by either the issuer or the POS terminal, or “no CVM” at all in case of low value/risk transactions. Now, what does cardholder verification look like for HCE?
- Card-Like User Experience (CLUE) – the payment app follows the same user experience as a regular contactless payment: tap and pay. Depending on the country, card schemes and POS terminals, Low Value Transactions (LVTs) sometimes do not require cardholder verification. For a High Value Transaction (HVT), the cardholder still has to enter his PIN at the POS.
- Consumer Device Cardholder Verification Method (CD-CVM) – users can authenticate themselves at the device via a fingerprint scan, password or swipe pattern.
- Flexible User Experience (FLUE) – this is a combination of CLUE and CD-CVM, but not solely one or the other.
The listed categories above give issuers and banks a flexible set to build a payment experience, which is in alignment with their standards and risk tolerance.
Validating transaction integrity
It is important to make sure that the transaction is not altered on the way between POS, card network, and card issuer. Apart from using various sets of encryption keys and transaction identifiers, HCE exchanges a payment cryptogram based on DPAN-derived SKs to validate transaction integrity on the issuer side.
Using risk management parameters
Each stakeholder within the EMV ecosystem should be able to apply risk measures. Which safeguards does HCE put into place?
- Fraud systems are able to inspect the frequency of SK replenishment. In case of malicious behaviour, the HCE wallet server can suspend the DPAN and stop the renewing of SKs.
- The payment app can only hold a small pool of SKs which minimizes the number of offline payments (the device has no internet connection) the fraudster could potentially make.
- Only allowing the provisioning of payment tokens on mobile devices that provide certain security standards, e.g. version of fingerprint readers, operating versions, etc., will reduce risk as well.
- Velocity tracking of LVTs without HVT in between.
This list is not complete, but it gives an idea of options issuers and banks can use to lower the risk of their HCE wallet service.
HCE product companies constantly work on security concerns to maintain reliable payment solutions. It is a fast growing market, which competes with the established OEM pays. However, competition is good, in particular when it comes to security. It keeps the pressure high to not lose the cardholder’s trust.
Während viele Unternehmen noch damit beschäftigt sind, im Rahmen ihrer agilen Transformation eine DevOps-Kultur einzuführen, entwickelt sich im Tooling-Bereich schon der Begriff NoOps, um weitere Schritte auf dem Weg zur vollständigen Automatisierung im Software-Betrieb zu beschreiben. Braucht es in Zukunft überhaupt noch ein Operations-Team?Mehr erfahren
Beim dritten Code Camp von ti&m drehte sich alles um das Thema künstliche Intelligenz (KI). Mehr als 20 Entwickler kamen zusammen, um ihr Wissen in der Technologie zu vertiefen. In 30 Stunden Programmieren lernten die Teilnehmer, was mit KI alles möglich ist.Mehr erfahren
When considering authentication, the first thing people think of is identity. However, with the use of new authentication frameworks applied to current business cases, essential security requirements seem to get neglected. Thus, it might just happen that we lose our identity on the internet. This article is part of a series based on different user’s feedback dealing with fundamental security concepts applied to the applicability of authentication and authorization protocols such as OAuth and OpenIDConnect.Mehr erfahren
Banks spend a vast amount of time researching and collecting data about clients, but often lack the bigger picture of connecting these separate data piles from various systems. Data alone is worthless, but connected and turned into information using an identity database, new possibilities such as reducing the cost per client, increasing quality of service and anticipating a client's actions are possible.Mehr erfahren