How Does HCE Address the EMV Goals?
Not a day goes by without new mobile payment apps popping up or the Original Equipment Manufacturers, also called OEMs, launching their own mobile wallets (Apple Pay, Samsung Pay, Android Pay) in additional countries. Especially Switzerland plays an interesting role by focusing on the payment solution TWINT to solve the local mobile payment needs. However, regardless of the payment app and underlying technology, all solutions need to balance usability and security in order to justify a valid business case.
This article introduces Host Card Emulation (HCE) as the standard technology stack for your Android-based payment app and addresses how it meets the main EMV (Europay International, MasterCard and VISA) goals to ensure secure payments at the Point of Sale (POS).
Understanding the role of Host Card Emulation
HCE is the term used to describe the entire ecosystem of mobile payment solutions on Android-based devices, which do not have access to a Secure Element (SE) or a Trusted Execution Environment (TEE). Usually, SE and TEE rely on proprietary hardware security to store and access sensitive keys such as the Card Master Key (CMK), whereas HCE solves this by using mobile device software in combination with a remote server.
There are various stakeholders in the HCE ecosystem, which play an important part in providing a seamless and secure payment experience to the cardholder. Ranging from a secure payment app that builds the user interface to initiate a mobile payment, to a trusted Wallet Service Provider (WSP), and finally a Tokenization Service Provider (TSP) that replaces the PAN with a payment token (DPAN).
Whenever we think of Host Card Emulation, we tend to focus on transaction flows rather on what “card emulation” actually stands for. The secure payment app is the equivalent to the card program that runs on the plastic card’s contact chip. As a result, the payment app ensures that a valid EMV transaction is sent to the Near Field Communication (NFC) reader at the Point of Sale.
As EMV transactions evolved towards being recognized as the more secure solution compared to magnetic stripe based payments, all HCE participants, such as software and hardware vendors, card issuers and card schemes, have aimed for the same security levels and market acceptance.
Does HCE live up to the EMV standards?
The main goals of EMV are to reduce fraud by the following measures:
- Validating authentication of payment card (chip),
- requesting cardholder verification,
- validating transaction integrity, and
- using risk management parameters.
Validating authentication of payment card (chip):
This means it should not be possible to copy a payment card or compromise the application programs on the chip. How can HCE solve this issue?
- After installing on the mobile device, each payment app has its unique instance ID.
- Registering the payment app on the device includes the storage of a device fingerprint at the HCE wallet server.
- The provisioning of a payment token to the software/hardware key store of a mobile device results in a unique combination of payment app instance ID, device fingerprint, and DPAN.
- Before replenishing limited-use Session Keys (SKs), the HCE wallet server validates the combination of the provisioned payment token, payment app instance ID, and device fingerprint.
In essence, the previous described steps make it difficult for a fraudster to request valid SKs from the HCE wallet server for a payment app that resides on a different device.
Requesting cardholder verification
You should be able to confirm that you are the cardholder by a method that is either dependent on the POS, transaction amount or other attributes. EMV allows several Cardholder Verification Methods (CVMs): Cardholder’s signature comparison by the merchant, validation of the PIN by either the issuer or the POS terminal, or “no CVM” at all in case of low value/risk transactions. Now, what does cardholder verification look like for HCE?
- Card-Like User Experience (CLUE) – the payment app follows the same user experience as a regular contactless payment: tap and pay. Depending on the country, card schemes and POS terminals, Low Value Transactions (LVTs) sometimes do not require cardholder verification. For a High Value Transaction (HVT), the cardholder still has to enter his PIN at the POS.
- Consumer Device Cardholder Verification Method (CD-CVM) – users can authenticate themselves at the device via a fingerprint scan, password or swipe pattern.
- Flexible User Experience (FLUE) – this is a combination of CLUE and CD-CVM, but not solely one or the other.
The listed categories above give issuers and banks a flexible set to build a payment experience, which is in alignment with their standards and risk tolerance.
Validating transaction integrity
It is important to make sure that the transaction is not altered on the way between POS, card network, and card issuer. Apart from using various sets of encryption keys and transaction identifiers, HCE exchanges a payment cryptogram based on DPAN-derived SKs to validate transaction integrity on the issuer side.
Using risk management parameters
Each stakeholder within the EMV ecosystem should be able to apply risk measures. Which safeguards does HCE put into place?
- Fraud systems are able to inspect the frequency of SK replenishment. In case of malicious behaviour, the HCE wallet server can suspend the DPAN and stop the renewing of SKs.
- The payment app can only hold a small pool of SKs which minimizes the number of offline payments (the device has no internet connection) the fraudster could potentially make.
- Only allowing the provisioning of payment tokens on mobile devices that provide certain security standards, e.g. version of fingerprint readers, operating versions, etc., will reduce risk as well.
- Velocity tracking of LVTs without HVT in between.
This list is not complete, but it gives an idea of options issuers and banks can use to lower the risk of their HCE wallet service.
HCE product companies constantly work on security concerns to maintain reliable payment solutions. It is a fast growing market, which competes with the established OEM pays. However, competition is good, in particular when it comes to security. It keeps the pressure high to not lose the cardholder’s trust.
Unser erfolgreiches Jugendförderprogramm hack an app wird dieses Jahr bereits acht Jahre alt. In diesen acht Jahren hat aber das Thema Nachwuchsförderung und der Mangel an Fachkräften im Bereich der Informatik nichts von seiner Aktualität verloren. Auch für 2017 haben wir darum den Informatik-Workshop wieder überarbeitet und noch spannender und interaktiver gestaltet.Mehr erfahren
We’ve been working on big data topics in our labs and with our clients for quite a while now. Over time, we built a framework of technologies and utilities we can build data driven projects on. We call it ti&m analytics.Mehr erfahren
Artificial Intelligence (AI) has been a major theme in the last decade and numerous big companies have invested a lot of effort into the technology. Within the scope of our last ti&m garage project, we too developed a small but efficient chat tool prototype for a big company in Switzerland.Mehr erfahren
Welche Vor- und Nachteile haben Kubernetes und OpenShift? Dieser Frage geht ti&m-Surfer Bernd Leinfelder in seinem aktuellen Blog-Beitrag nach.Mehr erfahren
When considering authentication, the first thing people think of is identity. However, with the use of new authentication frameworks applied to current business cases, essential security requirements seem to get neglected. Thus, it might just happen that we lose our identity on the internet. This article is part of a series based on different user’s feedback dealing with fundamental security concepts applied to the applicability of authentication and authorization protocols such as OAuth and OpenIDConnect.Mehr erfahren