Mastercard Secured Code-Issuer Implementation Guide
Mastercard Secured Code-Issuer Implementation Guide
Trademarks Trademark notices and symbols used in this document reflect the registration
status of MasterCard trademarks in the United States. Please consult with
the Customer Operations Services team or the MasterCard Law Department
for the registration status of particular product, program, or service names
outside the United States.
All third-party product and service names are trademarks or registered
trademarks of their respective owners.
Billing For printed documents, MasterCard will bill principal members. Please
refer to the appropriate MasterCard Consolidated Billing System (MCBS)
document for billing-related information.
Information Available MasterCard provides details about the standards used for this
Online document—including times expressed, language use, and contact
information—on the Member Publications Support page available on
MasterCard OnLine®. Go to Member Publications Support for centralized
information.
These factors increase costs to all parties for managing disputes and
chargebacks. More than 70 percent of all chargebacks for e-commerce
transactions are associated with reason code 4837 (No Cardholder Authorization)
or reason code 4863 (Cardholder Not Recognized), and are currently estimated
at a cost of USD 34.00 per chargeback to the industry. These reason codes are
used where the consumer denies responsibility for the transaction and the
acquirer lacks evidence of the cardholder’s authentication, or the consumer
does not recognize the transaction.
MasterCard Debit
Issuers of Debit® MasterCard, either single or dual message should note that
the single message system is capable of supporting transport of the Universal
Cardholder Authentication value (UCAF). Issuers must ensure that authorization,
and clearing for dual message are compliant with the latest debit standards
available on the Member Publications product on MasterCard OnLine®. The
MasterCard SecureCode authentication program occurs before an authorization
takes place, therefore, it can be used to authenticate any MasterCard card.
Issuers should ensure that their systems can support the transport of the
Account Authentication Value (AAV) before proceeding with a MasterCard
SecureCode program.
From a program perspective there are a number of decisions that an issuer has
to make prior to implementing MasterCard SecureCode.
• What is the issuer’s attitude to risk?
• When should you authenticate a transaction? Do you want to authenticate
every transaction or just those that fall into a certain risk profile? The
MasterCard Risk Based Authentication white paper may be relevant if a
percentage is preferred.
• How should you authenticate? See Chapter 7, Issuer Authentication Options
for a selection of possible Authentication options.
• How does this authentication strategy impact your current authorization
strategy?
The decision on authentication strategy will provide the shape of the issuer’s
SecureCode deployment and is, perhaps, the most important decision. This
decision will balance the following considerations:
• The cardholder experience that an issuer wants to support for their
cardholders. Just as card portfolios are segmented, authentication strategies
can also be developed offering multiple forms of authentication (for
example, SMS for youth, and display card for High Value).
• Cost of authentication
• Cost of fraud being experienced and projected
• Requirements from domestic regulators
The most common of these solutions for MasterCard and Maestro issuers is the
use of static or dynamic passwords. Dynamic password usage is typically based
on the Chip Authentication Protocol (CAP) that provides for the creation of a
one-time use cardholder authentication password. This scenario is similar to
what the cardholder experiences in the face-to-face environment using EMV
chip card and personal identification number (PIN). CAP is now available
in a number of form factors ensuring that a single CAP Issuer solution can
support SMS, Mobile Applications, Display Card and the traditional CAP models
using sleave devices. See Chapter 7, Issuer Authentication Options for more
information on authentication options. This program provides a seamless
integration of both EMV and 3-D Secure technologies that result in stronger
authentication than traditional static password solutions.
Cardholder
A cardholder is an authorized user of a card issued by a licensed financial
institution. In the e-commerce environment, consumers and corporate
purchasers interact with merchants remotely, typically through personal
computers. However, these points of interaction are expanding to include new
devices such as mobile phones. A cardholder uses a payment card issued
by a licensed MasterCard financial institution. MasterCard SecureCode will
ensure that a cardholder’s identity is authenticated prior to the completion of a
purchase from a participating merchant.
Issuer
An issuer is a MasterCard financial institution customer that issues either only
MasterCard cards or MasterCard and Maestro cards. The issuer guarantees
payment for an authorized transaction using the payment card in accordance
with payment card brand regulations and local legislation. Specifically for
MasterCard SecureCode, the issuer is responsible for determining cardholder
eligibility to participate in the MasterCard SecureCode program, as well as
providing authentication services for eligible online purchases.
Merchant
A merchant is a retailer, or any other person, firm, or corporation that, pursuant
to a merchant agreement, agrees to accept MasterCard and/or Maestro cards
when properly presented. With MasterCard SecureCode, the merchant can
offer a cardholder an authenticated electronic interaction over the Internet. A
merchant that accepts payment cards must have a relationship with an acquirer.
Merchants can benefit from participating in MasterCard SecureCode in several
ways including reduced fraud and dispute costs, increased transaction volume
and value, protection from unauthorized card use, and access to the Maestro
card base.
Acquirer
The MasterCard SecureCode program platform is comprised of a number
of layered components. As described in the following pages, each of the
components provides for specific authorization and authentication functionality
during the processing of a MasterCard SecureCode transaction.
The control byte contains a value that is specific to each security application.
MasterCard is responsible for assigning and managing UCAF control byte values
and the structure of UCAF application-specific data. Other solutions that use
UCAF for authentication collection and transport will be assigned their own
control byte value and the structure of the application-specific data will be
tailored to support the specifics of the security protocol.
Base64
Encoded Hexadecimal
Usage Value Value
3-D Secure SPA AAV for first and subsequent
j x’8C’
transactions
This field is also used to carry the static AAV that has been supplied to a
merchant that has been accepted into MARP. For additional information about
MARP, see Appendix E, MasterCard Advance Registration Program.
NOTE
The UCAF field length is variable up to a maximum of 32 positions. All acquirers and issuers must
ensure that they can send and/or receive contents in this field up to the maximum length of 32.
Applications using this field, such as SecureCode, may provide contents that are less than the
maximum length. For MasterCard SecureCode specifically, this field will be 28 positions.
For additional information about the contents of this field for a MasterCard
SecureCode authorization request message, see What is an AAV? in this chapter.
Sample DE 48 Contents
The following are examples of properly coded UCAF fields within a MasterCard
SecureCode authorization request message. The content of the DE 48,
subelement 42 is underlined.
Scenario Sample DE 48
MARP 5MARPPROGRAM9999999999999999
Fully authenticated T420701032124328jHyn+7YFi1EUAREAAAAvNUe6Hv8
authorization =820252
NOTE
The UCAF field (DE 48, subelement 43) is a variable
length field up to a maximum of 32 positions. The
MasterCard SecureCode AAV, in this case, is 28
characters in length. There must be no padding or
trailing spaces in the UCAF field.
Unauthenticated T42070103211820252
authorization from UCAF
enabled merchant
Unauthenticated T42070103210820252
authorization from
non-UCAF enabled
merchant
Scenario Sample DE 48
UCAF data field is T420701032124332jJJLtQa+Iws8AREAEbjsA1MAAAA= 820252
improperly padded The UCAF field (SE 43) is a variable length field up to a
maximum of 32 positions. The MasterCard SecureCode AAV is
28 characters in length. There must be no padding or trailing
spaces in the UCAF field.
Unknown Control T4207010321243328CC744DB69D5739CFE0100008
Byte and invalid EA89433820252
length indicator The contents of the UCAF data field is not properly Base64.
Instead the field contains a character representation of the
hex SecureCode AAV. The first character must be one of the
documented control bytes.
UCAF data field T42001032128701P4320Æ×ç¥ïXŠ ’ © ½ë9203123
contains binary The Security Level Indicator (DE 48, SE 42) is required when
AAV data instead UCAF data (DE 48, SE 43) is present in the message. This
of Base64 encoded results in a Banknet format error. Also, the UCAF data content
data is binary and not Base64 encoded.
What is an AAV?
The Accountholder Authentication Value (AAV) is a MasterCard SecureCode
specific token that uses the UCAF field for transport within MasterCard
authorization messages. It is generated by the issuer and presented to
the merchant for placement in the authorization request upon successful
authentication of the cardholder.
MARP Exception
For merchants that have qualified to participate in MARP, MasterCard assigns
a static AAV that conforms to the same format as an issuer-generated AAV.
MasterCard publishes regular bulletins to ensure issuers have a current, and
complete list of assigned static AAVs. See MasterCard OnLine for the latest
bulletin and Appendix E, MasterCard Advance Registration Program for more
information about MARP.
DEFINITION
An intraregional transaction is one in which the acquiring institution and issuing institution are in
the same MasterCard region, for example, the U.S., Canada, Europe, Asia Pacific, South Asia/Middle
East/Africa, and the Latin America/Caribbean regions.
An interregional transaction is one in which the acquiring institution and the issuing institution
are in different MasterCard regions.
If the issuer determines that the UCAF data provided by the acquirer in the
Authorization Request/0100 message is not identical to the UCAF data created
for that transaction, the issuer’s right of chargeback under these reason codes
is preserved.
In these cases, the liability for e-commerce transactions shifts from the acquirer
to the issuer when:
• The merchant is UCAF-enabled for this transaction; and
The following table summarizes the applicability of the global and merchant
only liability shift rules for qualifying transactions across the MasterCard regions.
Issuing Regions
Acquiring U.S. * * * * * *
Regions
CAN * * * * * *
EUR * * * * * *
LA/C * * * * * *
AP * * * * * *
SAMEA * * * * * *
Commercial cards remain excluded from the Global Merchant Only Liability
shift but are included on an intraregional basis for the Europe, Asia Pacific,
South Asia/Middle East/Africa, and the Latin America/Caribbean regions.
Issuing Regions
Acquiring U.S. ^ ^ ^ ^ ^ ^
Regions
CAN ^ ^ ^ ^ ^ ^
EUR ^ ^ * ^ ^ *
LA/C ^ ^ ^ * ^ ^
AP ^ ^ ^ ^ * ^
SAMEA ^ ^ ^ ^ ^ *
Commercial cards remain excluded from the Global Merchant Only Liability
shift but are included on an intraregional basis for the Europe, Asia Pacific,
South Asia/Middle East/Africa, and the Latin America/Caribbean regions.
Authorization Requirements
MasterCard issuers and acquirers must modify their authorization systems
to support the required UCAF transaction data elements. Further, it is a
requirement that all qualifying transactions must be properly coded e-commerce
transactions.
The following table highlights the field requirements that are required for
coding of e-commerce authorizations. For more information about the coding of
UCAF data elements for non–e-commerce transactions, refer to the appropriate
authorization message specification document.
Subfields
Maestro issuers must support MARP static AAV and standard SecureCode AAV
within authorization if they support e-commerce. Maestro issuers should check
for any regional requirements that mandates the use of e-commerce such as the
current mandate in the Europe region.
Clearing Requirements
In support of the MasterCard SecureCode program, MasterCard requires that
acquiring members must support changes to the Global Clearing Management
System (GCMS) clearing records in support of associated interchange rate
programs.
MasterCard requires that all clearing and chargeback records associated with an
e-commerce authorization message contain the DE 48, private data subelement
0052 (Electronic Commerce Security Level Indicator). Failure to include this
field will result in the message being rejected by GCMS with an edit error. The
contents of this field must be consistent with the value of the DE 48, subelement
42, position 3 in the corresponding authorization message. In addition, UCAF
interchange rate qualification for all transactions acquired in the U.S. region are
subject to interchange compliance edits.
NOTE
Issuers should refer to the latest Interchange Manual for their region to determine what interchange
is applied for Full UCAF and Merchant UCAF transactions.
Enrollment Requirements
Following are issuer requirements to participate in the MasterCard SecureCode
Electronic Commerce Program:
• All participating members must complete both a general enrollment form,
and the issuer program enrollment form.
See MasterCard SecureCode Program Enrollment Procedure in this chapter
for additional information.
• Select a vendor or service provider to provide the required infrastructure
(for example, merchant plug-ins, access control servers, and more.)
• Assign a program manager to manage, test, and integrate the current system
with MasterCard SecureCode.
• Ensure all authorization and clearing systems can support UCAF data. For
additional information, see UCAF Compliance Requirements in this chapter.
Maintenance Requirements
Issuers and acquirers should regularly review the content of their existing
registration document, especially when key individuals noted in the registration
move to other roles or leave the organization. If changes are required, a
new enrollment form should be completed and submitted for amendment of
the current registration.
Participation Responsibilities
The following sections explain member roles and responsibilities for
participation in the MasterCard SecureCode program. These roles and
responsibilities are applicable for both MasterCard and Maestro issuers.
No Representations or Warranties
Member agrees to indemnify and hold harmless MasterCard and its directors,
officers, employees, agents and affiliates against any and all claims arising out
of member’s participation in the MasterCard SecureCode program. Member
agrees that it shall not assert any claim or action against MasterCard arising out
or otherwise connected in any way with the MasterCard SecureCode program
and hereby waives all such claims against MasterCard and releases MasterCard
from and against any and all liability for such claims. Without limiting the
foregoing, member specifically waives and releases MasterCard from any and
all claims arising out of its operation of the MasterCard SecureCode certificate
authority. The foregoing limitations of liability shall apply to any claim or cause
of action under law or equity whatsoever, including contract, warranty, strict
liability, or negligence, even if MasterCard has been notified of the possibility
of such claims. The entire liability of MasterCard to member for any and all
acts, errors, and omissions relating to or arising out of or in connection with the
MasterCard SecureCode program shall be limited to USD 1,000.
Acceptance of Terms
The signing of enrollment forms indicates that the member understands and
agrees to the terms and conditions set forth herein including but not limited to
those above. The member acknowledges that its acceptance of these terms and
conditions is relied upon by MasterCard in permitting member’s participation in
the MasterCard SecureCode program.
Issuer Responsibilities
Issuers are responsible for the following:
• Soliciting cardholders to participate in the MasterCard SecureCode program.
• Adhering to:
– MasterCard requirements for information and data security, including
but not limited to protection of MasterCard card numbers, Maestro
account numbers, cardholder enrollment information and management
and protection of secret cryptographic keys. For more information, refer
to the SecureCode ACS Security Requirements manual.
– Applicable usage guidelines as published in MasterCard SecureCode
Program Identifier Usage Guidelines.
– Published requirements regarding authentication and enrollment pages
as documented in the MasterCard SecureCode Cardholder Interface
Requirements manual.
• Reporting to MasterCard on experiences and progress with cardholder use
of MasterCard SecureCode products, shopping experiences, and related
market research information.
• Providing:
All vendors, merchant endpoints, and issuers are required to complete the
designated testing process prior to launch. More information regarding testing
is available from [email protected].
MasterCard Support
MasterCard will provide support as explained below to members enrolled in
the MasterCard SecureCode program.
Additional References
Unless otherwise noted, all publications are available from the Member
Publications section of MasterCard OnLine.
NOTE
The documentation regarding the industry standard for 3-D Secure is not available from MasterCard.
These documents must be sourced under license from the standard owner.
Components................................................................................................................................... 2-1
Issuer Domain.......................................................................................................................... 2-1
Cardholder Browser and Related Cardholder Software ..................................................... 2-2
Enrollment Server .............................................................................................................. 2-2
Access Control Server ........................................................................................................ 2-2
AAV Validation Server/Process........................................................................................... 2-2
Acquirer Domain ..................................................................................................................... 2-2
Merchant Plug-In ............................................................................................................... 2-2
Signature Validation Server ................................................................................................ 2-3
Interoperability Domain........................................................................................................... 2-3
Directory Server ................................................................................................................. 2-3
Certificate Authority ........................................................................................................... 2-3
Transaction History Server ................................................................................................. 2-3
Attempts Server.................................................................................................................. 2-4
Messages........................................................................................................................................ 2-4
Card Range Request/Response ................................................................................................ 2-4
Verification Request/Response................................................................................................. 2-4
Payer Authentication Request/Response.................................................................................. 2-4
Payer Authentication Transaction Request/Response .............................................................. 2-5
Overview
Cardholder authentication is the process of verifying cardholder account
ownership during a purchase transaction in an online electronic commerce
environment. All MasterCard® SecureCode™ solutions define and provide a
base level of security around performing this authentication process. For this
solution specifically, MasterCard is deploying its own implementation of 3-D
Secure under the MasterCard SecureCode program branding for MasterCard®
and Maestro®. This implementation of 3-D Secure includes support for the SPA
algorithm and Universal Cardholder Authentication Field (UCAF) without any
changes to the 3-D Secure specification, messages, or protocol.
Components
Following is information about components related to the Issuer Domain,
Acquirer Domain, and Interoperability Domain.
Issuer Domain
The Issuer Domain is comprised of the:
• Cardholder browser and related software
• Enrollment server
• Access control server
• AAV validation server/proces
Enrollment Server
The purpose of the enrollment server is to facilitate the process of cardholder
enrollment for an issuer’s implementation of 3-D Secure under the MasterCard
SecureCode program. The server will be used to perform initial cardholder
authentication, as well as administrative activities such as SecureCode resets
and viewing 3-D Secure payment history. In some cases, the enrollment server
and the access control server may be packaged together.
Acquirer Domain
The Acquirer Domain is comprised of the:
• Merchant plug-in
• Signature validation server
Merchant Plug-In
The merchant server plug-in creates and processes payer authentication
messages and then returns control to the merchant software for further
authorization processing. The plug-in is invoked after the cardholder finalizes
the purchase request, which includes selecting the account number to be used,
and submitting the order but prior to obtaining authorization for the purchase.
Interoperability Domain
The Interoperability Domain is comprised of the
• Directory server
• Certificate authority
• Transaction history server
• Attempts server
Directory Server
The MasterCard SecureCode global directory server provides centralized
decision-making capabilities to merchants enrolled in the MasterCard
SecureCode program. Based on the account number contained in the merchant
enrollment verification request message, the directory will first determine
whether the account number is part of a participating MasterCard or Maestro
issuer’s card range. It will then direct eligible requests to the appropriate
issuer’s access control server for further processing.
All implementations of this issuer platform must use the MasterCard SecureCode
global directory server for processing MasterCard and Maestro® transactions.
Certificate Authority
The MasterCard Certificate Authority is used to generate and distribute all
private hierarchy end-entity and subordinate certificates, as required, to the
various components across all three domains.
Attempts Server
The MasterCard SecureCode infrastructure does not support this component
server.
Messages
The card range request/response, the verification request/response, the payer
authentication request/response, and the payer authentication transaction
request/response are all message types associated with the 3-D Secure Solution
process.
Verification Request/Response
Message Pair: VEReq/VERes—The first step in the payer authentication process
is to validate that the cardholder account number is part of an issuer’s card
range, which is participating in 3-D Secure. The Verification Request/Response
messages are sent from the Merchant Server Plug-In to the Directory to check
card range eligibility. If the specified account number is contained within a
SecureCode eligible card range, this message is then sent from the Directory to
the Access Control Server to check if the specific account number is enrolled
and active to participate in 3-D Secure.
For those merchants that cache the contents of the MasterCard SecureCode
directory server, this message is not used if the cache indicates that the issuer
is not enrolled in 3-D Secure. If the cache does indicate that the issuer is
enrolled, or if no cache is being maintained, this message must be formatted
and processed as described.
There are two primary types of interactions between a cardholder and the
issuer software:
• Enrollment—static password
• Purchase Transactions
Enrollment—Static Password
To shop with the assurance of 3-D Secure, a cardholder must enroll in the
program through the issuer. The enrollment process verifies the cardholder’s
identity and allows the cardholder to establish a SecureCode for authentication
while shopping online. Enrollment is typically required for static password,
when the cardholder is creating a password that will be used each time the
cardholder shops at a participating merchant.
All three methods may be implemented at the same time, although the
cardholder will only be required to enroll once.
NOTE
One-time password (OTP) via SMS or Chip Auntentication does not require cardholder enrollment.
For more information about OTP methods send an e-mail message to the MasterCard OAS team at
[email protected].
Standard Enrollment
The Standard Enrollment method is accessed through the issuer 3–D Secure
Home page, and allows cardholders to enroll before online shopping.
Figure 2.1 is the SecureCode landing page. The landing page is optional, and
is primarily used for issuers that support multiple:
• languages
• brands (MasterCard, Maestro, Visa®)
• portfolios (for example commercial and consumer) with different
configurations (different security questions or contact us information)
The Choose Registration Path page allows the cardholder to select either
Register (Standard Enrollment) or, if setup with a Temporary Access code
through CSR-Assisted Enrollment, Register with a Temporary Access Code.
The enrollment site checks the credentials of the cardholder against the
cardholder profile data.
The issuer enrollment server (ES) processes the enrollment and records the
SecureCode and Personal Greeting in the issuer database.
When a cardholder calls for assistance, the CSR verifies the cardholder identity
via the issuer’s regular identification procedure. The CSR then provides the
cardholder with a Temporary Access Code (TAC) and the hosted enrollment
site address. The cardholder navigates to the issuer’s 3–D Secure Home page
and uses the Temporary Access Code to enroll. The cardholder creates a
SecureCode and Personal Greeting to complete the enrollment.
NOTE
At initial setup, the issuer defines the number of days that the Temporary Access Code is valid. A
Temporary Access Code cannot be used for authentication while shopping and can be used only
once to enroll.
If the CSR manually enrolls a cardholder, the cardholder does not answer the
Web site identification questions. Instead the cardholder enters a temporary
access code. All other steps in the CSR-assisted enrollment process are the
same as standard enrollment. Refer to Figure 2.3.
1. The cardholder confirms identity to an issuer CSR via telephone using the
issuer’s normal authentication procedures.
2. The issuer CSR adds the cardholder account data, if required, and the
Temporary Access Code to the application database. The issuer CSR
provides the cardholder with a Temporary Access Code and registration URL.
3. The cardholder accesses the hosted by MasterCard issuer enrollment site
and uses the Temporary Access Code to confirm identity. The cardholder
then creates a SecureCode.
Activation-During-Shopping Enrollment
Activation-During-Shopping (ADS) enrollment allows cardholders to register
for the SecureCode program while shopping using a process managed by
MasterCard OAS.
The issuer software displays the second page of ADS to the cardholder. The
cardholder creates a SecureCode and completes any additional information
requested by the issuer.
Option: Invite the cardholder to personalize the Personal Greeting and provide
an e-mail address at the standard enrollment site. This is achieved through
a window that will appear as the lowest open window available on the
cardholder’s desktop (as opposed to a pop-up which becomes the primary
window on the desktop).
NOTE
During ADS, a default Personal Greeting can be assigned by the Issuer software and uploaded to
MasterCard OAS and can be changed by the cardholder via account management on the enrollment
Web site. The Personal Greeting is a customizable message that assures the cardholder that the
Purchase Authentication screens are presented by their issuer.
Cardholder Authentication
Following is information about the cardholder authentication process.
The figure below also assumes that all communication channels between the
various components are properly secured using the Secure Socket Layer (SSL)
protocol. See Chapter 6, Component Certificate Requirements for additional
information.
Link Description
SSL-1 The cardholder shops at the merchant and, when ready to checkout,
enters the appropriate payment information—including the account
number.
SSL-2 The Merchant Plug-In queries the Directory to verify the enrollment
status for a specific issuer using the verification request messages. It is
possible that this step will be performed locally at the merchant via the
local MasterCard directory cache, if applicable.
Link Description
SSL-3 If the directory indicates that an issuer is participating, then the directory
must forward a request to the issuer’s Access Control Server to check the
enrollment status of a specific cardholder. The configuration information
in the Directory will indicate exactly which Access Control Server will
perform the check. The resulting response will flow back over the same
links to the Merchant Plug-In.
When received by the issuer, the AAV can be validated as part of authorization
request processing, as well as archived for use in potential cardholder disputes.
Infrastructure.................................................................................................................................. 3-1
Availability of Secure Browser ................................................................................................. 3-1
Overview
This chapter outlines the major activities and requirements for building
and maintaining the cardholder components that are required to support
MasterCard® SecureCode™.
The activities and requirements are separated into five primary categories:
• Infrastructure—Installation of new hardware and software components.
• Customization—Customizing or configuring vendor products.
• Operational—Operating the components in a production environment,
including any process oriented changes that may be required.
• Accountholder Authentication Value (AAV) Processing—Handling and
processing of the AAV.
• Global Infrastructure Testing Requirements—Testing of MasterCard
SecureCode platform components with the MasterCard SecureCode global
infrastructure.
Infrastructure
Following is the cardholder infrastructure requirement for the installation of
new hardware and software components that support MasterCard SecureCode.
Customization
There are no customization issues related to cardholder participation in
MasterCard SecureCode program.
Operational
Following are the cardholder requirements for operating the components in
a production environment, including any process-oriented changes that may
be required.
Cardholder Registration
Depending on the exact nature of a card issuer's program, cardholders may be
asked to register with their issuer to participate in its MasterCard SecureCode
program. Issuers have the option of allowing cardholders to enroll in the
program while shopping at a participating merchant or outside of this process
all together. The exact method of registration will be both issuer and issuer
platform specific.
For accounts with more than one authorized user (for example, husband
and wife), both users should be able to register and create their own unique
SecureCode. After one of the authorized card users has registered, all online
payments using that card—at participating merchants—will cause the cardholder
authentication process to initiate. This process will initiate even if the buyer is
not the cardholder that explicitly enrolled in the program.
5. The minimum acceptable pixel size, both for the SecureCode Program
Identifier and the issuer logo, is 62w x 34h. It is recommended that the
issuer logo be at least as large as the SecureCode Program Identifier. The
issuer logo may be larger than the SecureCode Program Identifier, however
the total area designated for use by both logos must never exceed one-sixth
of the total page area.
6. The minimum acceptable font size is nine.
7. The purchase authentication page must display the required purchase
transaction data carried in the Payer Authentication Request (PAReq)
message as defined in the 3-D Secure specification. This required data
include:
10. The purchase authentication page must not contain any external links
or be used for any purpose other than authentication. For example, the
page must not be used for promotions, advertising, or other marketing
communications.
11. The purchase authentication page must contain the text “This information
is not shared with the merchant.”
12. If a user ID is used in addition to SecureCode values for authentication
purposes, the user ID must be pre-populated on the purchase authentication
page to minimize cardholder confusion and data entry requirements.
13. A fallback mechanism must be supported in cases where Java script is either
disabled or unavailable at the cardholder’s browser.
14. All uses of the term SecureCode™ must be in English.
15. No scroll bars are permitted.
• Issuers must display their name, logo, or both, as well as the SecureCode
program identifier, on all enrollment pages to assure their cardholders that
their registrations are being processed by a trusted party. All enrollment
pages must adhere to the Program Identifier Usage Guidelines accessed
using the following Web address: www.mastercard.com/us/merchant/secu-
rity/what_can_do/pdf/SecureCode_logo_usage.pdf.
• On all enrollment pages, the minimum acceptable pixel size, both for
the SecureCode program identifier and the issuer logo, is 120w x 65h.
MasterCard recommends that the issuer logo be at least as large as the
SecureCode program identifier. The issuer logo may be larger than the
SecureCode program identifier, however the total area designated for use by
both logos must never exceed one-sixth of the total page area.
NOTE
The above requirement differs from those for the authentication page logo.
• The enrollment pages must not be used for non-enrollment purposes such
as promotions, advertising, or other marketing communications, unless the
promotion is directly related to program enrollment or usage at participating
merchants.
• Issuers must establish a Personal Greeting for all cardholders, either by
soliciting cardholders to provide their own Personal Greetings at the time
of enrollment or by assigning a unique or common Personal Greeting to
all enrolled cardholders. Personal Greetings assigned by an issuer must
not contain cardholder account numbers, SecureCode values, or other
private information. Dual issuers that are deploying 3-D Secure for both
MasterCard and Visa are permitted to use the term “Personal Message” as an
alternative to “Personal Greeting.”
• Issuers must provide a method for resetting a forgotten SecureCode.
MasterCard recommends prompting cardholders to answer the same shared
secret questions asked during enrollment. Other examples include:
– Provide a Secret Question and Answer process. This is where the
cardholder defines a question and associated answer. The question
can be either determined by the cardholder or selected from an issuer
provided list.
– Provide an authentication process conducted via phone by a customer
service representative. MasterCard recommends re-authentication over
other methods because it is more secure, easier for the cardholder,
and less expensive for the issuer.
• Issuers must ensure cardholders have access to the issuer’s relevant terms
and conditions and privacy policy before cardholders are asked to enroll
and/or activate. Additionally, if legally required, issuers must ensure
cardholder acceptance of these terms, conditions, and policies.
Communication
Requirements include:
• Issuers should remind the cardholder that MasterCard SecureCode is an
enhancement to their existing MasterCard® card or Maestro® card and that
applying for a new card is not necessary.
• If issuers will not be charging cardholders for the SecureCode service, they
should mention this prominently on the welcome page.
Cardholder response rates to ADS have been higher than those associated with
standard enrollment, when issuers have sufficiently communicated SecureCode
program details and benefits to their cardholder base. While effective in driving
program enrollment, issuers must take care to minimize any disruption to
purchase completion and avoid negative impact to participating merchants.
Early use of ADS caused some concern within the merchant community
regarding the potential for disruption of the sales process in some issuer
deployments. Such concerns included the consumer abnormally terminating the
registration, thereby causing abandonment of the entire purchase transaction.
Problems that occurred can be traced to a handful of causes that can be easily
avoided:
• Lack of consumer education
• Lack of proper financial institution and program identifiers
Registration windows must clearly identify the consumer’s financial
institution to avoid confusion and fear of spoofing or “phishing” scams.
• Overly long registration process
Once presented, the registration should be short and straightforward. The
use of too many questions to establish the identity of cardholders will only
tax their patience and cause them to abandon the process.
Each issuer is responsible for evaluating the pros and cons of ADS enrollment
in general, as well as the individual methods for initiating ADS, to determine
which course of action is most appropriate for its program. However, the
requirements and guidelines outlined below are based on issuer experiences as
well as on extensive focus groups and usability studies, so issuers may want to
leverage these learnings for their own SecureCode deployments.
Benefits
ADS enrollment benefits issuers directly by providing a low cost, yet effective,
means for mass enablement of cardholders that shop at participating SecureCode
merchants. Issuers can leverage the growing population of SecureCode enabled
merchants as points of enablement for their programs. When complemented
with cardholder communication programs via traditional channels such as
e-mail, statement messages, statement inserts, and direct mail, ADS can result
in significantly higher consumer uptake than traditional enrollment methods.
MasterCard requires that any issuer using ADS maintain a standard enrollment
site containing detailed program information, and that issuers using ADS comply
with the following communication requirements.
General Requirements
Requirements include:
• Issuers must provide enrollment program details for SecureCode ADS to
MasterCard no later than 30 days before the planned program initiation
date. These communications must alert cardholders that they may receive
a SecureCode enrollment request box from their issuer while shopping
online. MasterCard must approve the following issuer program details
before implementation can commence:
– Screen shots of the cardholder graphical user interface at the time of
functional testing
– Cardholder communication plans, including the issuer’s SecureCode
Web site URL, and copies of communications pieces including any
statement inserts, statement messages, or direct mail pieces
– ADS program rollout schedule
– E-mail notifications, if feasible
• Issuers that want to launch an ADS enrollment program must initiate the
following cardholder communications:
– Statement messaging—statement messaging must begin at least 30 days
before the program launch and must continue for at least two months.
– Notification on issuer Web site(s)—in addition to describing
consumer program benefits, the issuer also may provide a link to
www.mastercard.us/securecode.html for details pertaining to the overall
MasterCard SecureCode program.
• Issuers must display their name, logo, or both, on all ADS enrollment and
authentication pages to assure their cardholders that a trusted party is
processing their transactions.
• All ADS enrollment pages must include the SecureCode program identifier
logo and must adhere to the program usage guidelines.
• The minimum acceptable pixel size, both for the SecureCode program
identifier and the issuer logo, is 62w x 34h. MasterCard recommends that
the issuer logo be at least as large as the SecureCode program identifier.
The issuer logo may be larger than the SecureCode program identifier, but
in no case may the total area taken up by both logos exceed one-sixth
of the total page area.
• The minimum acceptable font size is nine.
• Issuers are limited to two pages for ADS enrollment exposure, including
the enrollment and authentication pages. Page sizes must adhere to the
guidelines outlined in this chapter:
a. Merchants: Minimum of 400 pixels high x 400 pixels wide
b. Issuers: Maximum of 390 pixels high x 400 pixels wide
In addition, issuers should restrict the size of text, source code, and graphics
to enhance transaction processing speed.
• Issuer authentication pages must not resize the merchant-created
authentication page window. While this causes no real impact with the use
of pop-up windows, it does cause merchant Web site presentation problems
with the use of inline windows.
• Issuers must not ask cardholders to establish a SecureCode hint during ADS
enrollment. Issuers may pre-assign unique or standard SecureCode hints
for their card bases.
• Pending MasterCard approval, issuers may ask cardholders to establish a
Personal Greeting during ADS enrollment.
• Dual issuers that are deploying 3-D Secure for both MasterCard and Visa are
permitted to use the term “Personal Message” as an alternative to Personal
Greeting.
• Issuers must ensure cardholders have access to the issuer’s relevant terms
and conditions and privacy policy before cardholders are asked to enroll or
activate. Additionally, if legally required, issuers must ensure cardholder
acceptance of these terms, conditions, and policies.
• Direct links to items other than terms and conditions or a privacy policy
are permitted if such links are critical to achieving a successful activation.
Acceptable linked windows include an explanatory diagram of the
“signature panel code” or a program explanation. Such links must be
for content resident at the ACS as no external links are permitted due to
impacts to processing time.
• ADS may be used only for SecureCode enrollment of MasterCard or Maestro
accounts. It must not be used as a channel for promotions or advertising.
• The standard enrollment site URL may be included only as text and not as
an active link, to minimize interruptions in the purchasing process.
• A pop-under program announcement is permitted as an informational piece
following a successful enrollment or, optionally, if a cardholder chooses
to delay enrollment.
• In consideration of ADS enrollment occurring during the online buying
session, issuers should consider carefully the selection of authentication
data and understand consumer reaction to providing sensitive personal
information such as a full social security number. MasterCard recommends
requesting abbreviated information for sensitive data, such as the last four
digits of the social security number. As a best practice, MasterCard also
recommends no more than four data items be used for authentication and
that data items selected are readily accessible to the cardholder to facilitate
completion of the registration.
• As a best practice, MasterCard recommends that a SecureCode be a
minimum of six characters and contain at least one number and one letter.
Use of ATM PINs is strongly discouraged.
The issuer Access Control Server (ACS) receives a Payer Authentication Request
(PAReq) message requesting authentication of the specified cardholder. The
ACS, recognizing that the cardholder is not currently enrolled in the program
but belongs to a qualifying card range selected by the issuer, provides the
cardholder with the requisite information, determined by the type of ADS being
performed. See Required Access Control Server Processing in this chapter for
additional information.
The cardholder has successfully been authenticated and activated for the
issuer’s SecureCode program.
PARes
Transac- AAV
tion Sta- Control AAV Authentication
Description tus Byte Method
The cardholder is successfully Y x8C Any non-zero value as
authenticated and enrolled in defined in the Secure
SecureCode. Payment Application
(SPA) Algorithm
for the MasterCard
Implementation of 3-D
Secure
The cardholder attempted N N/A N/A
to authenticate but was not
successful.
The cardholder decides not to A x88 0
enroll in the program at the
current time
The cardholder is successfully A x88 0
authenticated but chooses not
to complete the process (this
includes selecting to “X” out of
enrollment).
The issuer ACS must follow the procedures for generating a Secure Payment
Application (SPA) Accountholder Authentication Value (AAV). These procedures
are defined by MasterCard for “Attempts” processing using the SPA Algorithm
for MasterCard Implementation of 3-D Secure. In addition to proper setting
of the control byte, MasterCard requires the Authentication Method field
within the SPA AAV to be set to 0 when the Transaction Status field in the
PARes message is set to A. Use of an Attempts designation in support of ADS
cardholder enrollment deferment or decline does not imply broader support of
Attempts processing by MasterCard.
The AAV that is created for a transaction status of “A” (attempt) is not
based on an actual cardholder authentication. Per the existing MasterCard
implementation requirements, SecureCode-enabled merchants must not include
an AAV associated with a PARes message with an Authentication Status of “A”
and an AAV control byte of x86 to be passed with the authorization request
to the acquirer. Such transactions do not qualify as authenticated transactions
and would not benefit from liability shifts associated with MasterCard rules
for fully authenticated transactions.
Best Practices
In addition to the requirements outlined in the previous sections, MasterCard
has compiled the following list of recommended best practices.
Program Awareness
Issuers should give cardholders several chances to enroll, as repeated exposure
will build familiarity. Alternatively, a mandate can be used quite effectively but
should follow an opt-in period to minimize negative reaction.
If the consumer chooses not to activate, his or her e-mail address may be
captured so information about the program can be sent to the consumer for
future consideration.
Communication
Use low-key language to communicate the benefit of SecureCode, for example,
“even more secure … an extra level of security.”
Be clear about how SecureCode works. For example, state: “If someone doesn’t
know your code they can’t use your card.”
If an e-mail address is collected, reassure the consumer that it will not be sold
to or shared with any third parties.
Once cardholders are enrolled, remind them that program login is not
necessary. (The lack of login confused cardholders who expected to “initiate”
the SecureCode purchase process when needed.)
ADS Screens
Feature the Program Terms link prominently on the first screen as many
consumers expressed interest in reviewing the terms before committing to the
program. When the link is clicked, the Program Terms should appear in a
smaller window.
Limit the number of security questions required to two or three. (Four appeared
to be troublesome.) Do not ask for the cardholder’s entire social security
number, as many consumers are wary of putting this information online. Be
sure the information being asked is on file, accurate, and complete, so that
eligible cardholders avoid unnecessary failures and frustration.
Create a clear distinction between the identity verification step and the step
in which the SecureCode is created.
Issuers should be aware of which pieces of data cardholders are sensitive about
sharing because requesting a “sensitive” piece of data will depress response
rates. (For example, cardholders may be willing to provide the last four digits
of their social security number, but not the entire number.)
Where possible, one of the screens should include the exact URL where
program details can be found so that the cardholder does not have to search
through the issuer’s entire site to find the SecureCode section.
Overview
This chapter outlines the major activities and requirements for building and
maintaining the issuer components that are required to support MasterCard®
SecureCode™.
The activities and requirements are separated into five primary categories:
• Infrastructure—Installation of new hardware and software components.
• Customization—Customizing or configuring vendor products.
• Operational—Operating the components in a production environment,
including any process oriented changes that may be required.
• Accountholder Authentication Value (AAV) Processing—Handling and
processing of the AAV.
• Global Infrastructure Testing Requirements—Testing of MasterCard
SecureCode platform components with the MasterCard SecureCode global
infrastructure.
Infrastructure
Following are the requirements related to the installation of new hardware and
software components.
In the case of a successful cardholder authentication, the ACS will create an AAV.
In the case of a chargeback or other potential dispute processing, the AAV will
be used to identify the processing parameters associated with the transaction.
MasterCard has defined several key fields within the AAV structures that will
identify, among other things:
• The ACS, which created the AAV.
• The sequence number that can be used to positively identify the transaction
within the universe of transactions for that location.
• The secret key used to create the message authentication code (MAC),
which not only ensures AAV data integrity but also binds the entire AAV
structure to a specific PAN.
The following field dependencies have been established and must be considered
when building a cardholder authentication installation. To begin, each
cardholder authentication facility will have a numeric identifier assigned to it.
For each cardholder authentication facility with the same facility ID:
ACS hosting providers and processors must have the ability to utilize a separate
digital signature key and associated MasterCard hierarchy certificate for each
issuer.
ACS hosting providers and processors must have the ability to use a separate
secret key for each individual issuer.
Maestro Considerations
The following requirements and activities are specific to issuer support of
Maestro® cards as part of the MasterCard SecureCode program.
Track 2 Requirements
If the issuer’s authorization system requires track 2 data, the issuer will need
to implement a platform that can intercept the message prior to authorization
and create real track 2 data. Technology vendors, which implement surrogate
account number solutions, are good candidates for these platforms. Currently,
Maestro authorization networks will add pseudo Track 2 data in the following
format:
MDS Support
Maestro is supported on the Single Message System in regions outside of the
Europe region. Issuers are required to reference the appropriate authorization
specification manual for messaging details.
Customization
The following is MasterCard SecureCode customization information for issuers.
MasterCard recommends that all issuers ensure that the content of their
cardholder facing screens adhere to all parameters related to regional or country
specific disability requirements as defined by the applicable law.
Issuers should be aware that not all cardholder browsers can support JavaScript.
Issuer screens must be able to function properly in the event that the
cardholder’s browser has JavaScript enabled.
Regardless of the method chosen by issuers, following are some basic planning
decisions that must be made:
• Method of cardholder enrollment authentication. This could be via existing
systems such as an online banking site or it could relate to answering of
secret questions. In the latter case, MasterCard recommends using multiple
pieces of information to perform the authentication. Examples may include
Address Verification Service (AVS) and Card Validation Code 2 (CVC 2)
checks in combination with various secret questions.
• Definition of secret questions for example, authentication questions, that
must be answered by the cardholder. MasterCard recommends that issuers
ensure that the secret information is verifiable and not all available from a
single source, such as a monthly statement. Examples may include mother’s
maiden name, partial social security number, national ID number, date
of birth, or secret activation code.
• Definition of cardholder terms and conditions.
MasterCard has developed strict requirements regarding the use of the various
cardholder enrollment methods. Proof of adherence to these requirements
must be provided to MasterCard as a condition of successful completion of
SecureCode issuer functional testing. MasterCard highly recommends that all
screenshots be provided for review as soon as possible in case changes are
required.
Operational
Following are details about the operational aspects of issuers implementing
MasterCard SecureCode.
Customer Service
Issuers must assess customer service training and modifications of dispute
resolution procedures to incorporate the Accountholder Authentication Value
(AAV).
MasterCard has currently defined two ECI values. The table below indicates the
relationship between these values and the status field in the PARes message.
PARes
Status MasterCard ECI
Field Description Value
Y Cardholder was successfully authenticated 02
A Authentication could not be completed but a 01
proof of authentication attempt was provided.
NOTE
h vs. j in the control byte.
N Cardholder authentication failed Absent
U Authentication could not be completed due to Absent
technical or other problems
At a minimum, issuers are required to maintain the SPA AAV and all information
(for example, secret keys) required to perform the validation for the requisite
transaction in the event of a customer chargeback or other dispute involving
the transaction. MasterCard recommends a storage period of at least 180 days.
When validating the SPA AAV, it must first be Base64-decoded. For additional
information about Base64, refer to Appendix A, SecureCode SPA Algorithm
Specifications.
Issuers must be aware that the Attempts processing model, as defined in the
3-D Secure Protocol version 1.0.2, permits the creation of a SPA AAV without
cardholder authentication. At the time of publication, the only approved
use of an attempt response is when the cardholder declines to enroll in the
program as part of Activation During Shopping (ADS). A cardholder could
decline to enroll at either the Identification and Verification or Create Your
SecureCode screens of standard ADS enrollment. Issuers are restricted from
using Attempts processing for any other purposes as part of a MasterCard
SecureCode implementation.
These Web presentations are free to view and only require an e-mail address to
register and view the content.
Overview
All components within a MasterCard® SecureCode™ infrastructure are required to
provide appropriate transport security to the data being passed between them.
This is accomplished by using the Secure Socket Layer (SSL) protocol, which
provides for the following:
• SSL Server Certificate Authentication—Provides a mechanism for the client
(for example, the party requesting the communication session) to assure
that the server sending the data is a trusted party.
• SSL Client Certificate Authentication—Similar to the server certificate
authentication except that it also allows the server to assure that the client
requesting the data is a trusted party. Failure of the SSL certificates to
authenticate will result in a failure of the communication session to establish.
Public Zone
The inclusion of a transaction flow in the public zone is a direct result of
the requirement for a secure communication channel with the cardholder’s
browser. Because it is unrealistic to require cardholders to import a MasterCard
root certificate to participate in the protocol, all communication channels
within this zone must use SSL certificates that are created from a public root
hierarchy. The communication channels within this zone will be secured with
SSL server certificates only. The cardholder will not be required to have a
SSL client certificate.
The following table highlights the communication links, which fall within the
public zone.
Trusted Zone
The inclusion of a transaction flow in the trusted zone is a direct result of
the requirement of a more trusted, secure communication channel between a
finite set of participants. As a result, this zone will contain all non-cardholder
communication channels.
The following table highlights the communication links for each MasterCard
SecureCode platform, which fall within the private zone.
Configuration Options
The 3-D Secure with SPA AAV issuer platform has the following configuration
requirements within the private zone:
The following table indicates responsibility for creating, signing, and managing
the various roots, subordinates, and end entity certificates in the hierarchy.
Certificates
Following is information about different types of certificates.
Root Certificate
The MasterCard CA has created the root certificate specifically for SecureCode.
It is self-signed and is shared by MasterCard and Maestro.
Validity Period: May be up through the expiration date of the Root and
Acquirer subordinate CA certificates.
Key Usage Period Recommended—2048 bits
Minimum—1024 bits
The difference between the validity and key usage
periods is a direct result of having to perform
authentications on transactions after the key usage
period has expired.
Common Name (CN): The common name must be populated with one of the
following characteristics of the site that will use the
certificate:
Domain Name For example
www.merchant.com
Externally visible IP For example 1.2.3.4
address
Externally visible IP For example
address range 1.2.3.0–1.2.3.255
Organizational Unit (OU) Name of the merchant or merchant processor (if
applicable) requesting the certificate.
Acquirer BIN, as indicated For example
in the associated acquirer 543210:Acquirer Name
enrollment forms, and
Name of the acquirer.
The two fields must be
separated by a colon.
Country Country where the merchant or merchant processor
is located. This should be the ISO 3166 2 character
country code (for example, U.S.)
Requesting Certificates
For more information about the certificate request process, please refer to the
MasterCard SecureCode Production Procedures publication. Copies of this
document are available on request from [email protected]. All
requests that fail to follow the published procedures will be rejected.
CAP................................................................................................................................................ 7-4
Background
Perhaps the most important issuer decision in a MasterCard® SecureCode™
implementation is how to authenticate the cardholder, and in case of a
transaction dispute, provide evidence of authentication.
The decision will differ depending on the issuer’s view and the attitude to risk.
While issuers must evaluate the risk/reward of these options, this section will
focus on explaining some of the available options.
Static Password
MasterCard launched the MasterCard SecureCode static password in 2002, as an
entry level initial deployment that could be quick to market, not as a long term
strategy. Much of this publication is still aimed at this proposition, therefore,
it does not provide in-depth detail.
• Quick to market.
• Relies on a static password and usually on static data to identify the
customer when they enroll.
• Know your customer, Identification and Verification (ID&V), is important
to ensure that fraudsters can neither enroll in the service on behalf of a
genuine cardholder, nor change the password of an enrolled cardholder.
• Activation During Shopping (ADS) produces good enrollment results for an
issuer, but interrupts the shopping experience. It is important to follow the
practices identified in this publication, because if executed poorly, ADS can
cause genuine cardholders to abandon transactions. Additional information
is available in the MasterCard SecureCode Issuer Best Practices.
• Needs communication to cardholders to ensure that they are aware of the
SecureCode process before they are requested to enroll, especially in the
case of ADS.
Although static password was a common solution in the past, new deployments
where SecureCode deployment is strong such as the the Asia/Pacific, South
Asia/ Middle East/Africa and Europe regions, are moving to a dynamic solution.
To avoid the issues surrounding ID&V some issuers using static password
have undertaken a “PIN Mailing” whereby all existing cardholders receive
a SecureCode through the mail with full information on its use. Making
SecureCode part of the card opening procedures is also gaining in popularity.
Random Static
Random static is a variant of a static password solution that some issuers have
chosen to deploy. It is similar to that seen for some banks Internet banking
solutions. Although the cardholder still has a static password, they are never
asked to complete the entire password when prompted but rather a random
selection of characters from the password. For example, first, sixth, and ninth
are depicted in Figure 7.1.
The same issues stated above for Static Password are also seen and should be
considered in this deployment.
SMS
The use of Short Message Service (SMS) has grown in popularity with the
advantage that almost any phone issued today can support this communication
method. Banks use this method to send alerts to their customers, and it can
now be used as an authentication method for MasterCard SecureCode.
The generation of a dynamic code that is sent to the registered hand set can
be undertaken in a number of ways and issuers should discuss this with their
Access Control Server (ACS) vendor. One way that MasterCard undertakes this
is through the use of a CAP (Chip and Pin) authentication server. This single
server could be used for validation of CAP, Mobile Application and Display
card values, and the generation of SMS passwords. In addition to re-using
investments made in EMV, this method allows Chip issuers to examine a
solution that could support several authentication options.
Figure 7.2—SMS
Mobile Application
Smart phones are growing in issuance and in popularity. The number of
mobile applications is also growing rapidly. MasterCard has a growing number
of mobile applications, some of which, such as Google Wallet, are not yet
available globally.
One option that is available globally is the Advanced Authentication for Mobile
application. This application resides on the smart phone and allows a secure
software application to have the equivalent of the consumers chip card on
the phone. This solution allows the cardholder to have a similar experience
that they would in a face-to-face chip transaction. The customer, opens the
application, enters their PIN, and obtains a generated SecureCode, which is
then used in the usual box required by their issuer.
The issuer can verify the password by using the same “black box” solution
available for any EMV-generated authentication.
Ensuring that the application is delivered to the cardholders mobile phone will
be a key consideration in this deployment.
CAP
Perhaps the closest user experience to the face-to-face channel that a Chip and
Pin (CAP) cardholder can experience is through the use of a CAP device as
depicted in Figure 7.4.
In this case, a cardholder would insert their card into the reader and follow the
prompts on the device to enter their pin and generate their SecureCode.
Balance needs to be maintained between the user experience and the chance
for fraud. For example, an issuer may decide that a simple PIN driven
SecureCode would be sufficient for amounts under a defined threshold with
increased requirements for high-value items.
This may not be a practical solution for cardholders that shop from multiple
devices and locations. For those that shop either from home or work, this
added security and simple cardholder experience may be appealing.
Display Card
MasterCard has launched a new card design that integrates the CAP reader into
the card in two designs, as depicted in Figure 7.5. In the first design, the act
of pushing a single button will generate a one time code in the display. For
increased security, there is a second option that works like the CAP reader in
that it requires the cardholder to first input their PIN.
These cards can be configured to also work with the CAP reader to provide
both options for generating the SecureCode.
The Display Card is still based on the EMV standard and the same “black box”
solution that would check the authentication from Mobile Authentication and
CAP can be used to verify the number generated by the display card.
These cards are available for all MasterCard cards including credit, debit and
Maestro®.
Virtual Card Numbers can be a strong issuer and cardholder solution if the
numbers are generated in a secure way.
Solutions, such as the inControl offering from MasterCard, can add further value
through features such as cardholder alerts, prohibitions from using the card at
certain merchants/MCCs, and maximum value of purchase. This can be used
for any card but is particularly popular for commercial cards.
When the virtual card is used, this integration avoids the cardholder being
prompted for an additional SecureCode password, and also delivers the fully
authenticated response to the merchant in silent mode. The added value is that
this integration can also, optionally, provide a failed authentication response to
the merchant if the real card is used, and an advice to the cardholder to use the
virtual card system supplied to fulfill the transaction.
When SecureCode was launched in 2002, the assumption was that a merchant
deploying SecureCode would pass every transaction through the program to
gain the liability shift and available interchange incentives, and that an issuer
would want to authenticate every transaction.
Current experience challenges this thinking and the integration of a risk engine
into the authentication experience balances the need to combat fraud with the
cardholder experience. There are several factors that will determine if fraud
is likely and cardholder authentication is required.
Base64 Encoding
The following overview of Base64 encoding is taken from RFC1521 “MIME
(Multipurpose Internet Mail Extensions) Part One: Mechanisms for Specifying
and Describing the Format of Internet Message Bodies”. For more detailed
information, refer to www.ietf.org/rfc/rfc1521.txt?number=1521.
Introduction
Base64 encoding is designed to represent arbitrary sequences of octets in a form
that need not be humanly readable. The encoding and decoding algorithms
are simple, but the encoded data are consistently about 33 percent larger than
the un-encoded data.
The encoding process represents 24-bit groups of input bits as output strings
of four encoded characters. Proceeding from left to right, a 24-bit input group
is formed by concatenating three 8-bit input groups. These 24 bits are then
treated as four concatenated 6-bit groups, each of which is then translated into
a single digit in the Base64 alphabet. When encoding a bit stream via the
Base64 encoding, the bit stream must be presumed to be ordered with the
most-significant-bit first. That is, the first bit in the stream will the high-order
bit in the first byte and the eighth bit will be the low-order in the first byte,
and so on.
Examples
The following examples will perform the beginning steps of Base64 encoding
of an AAV control byte field. The encoding process for the remainder of the
AAV will follow the same process.
1 0 0 0 1 1 0 0
The data is then broken down into three 24-bit segments, which are interpreted
as four 6-bit segments for encoding. In this case, the first 6 bits equal:
1 0 0 0 1 1
32 + 0 + 0 + 0 + 2 + 1
Decimal 35 = Base64 j
1 0 0 0 0 1 1 0
The data is then broken down into three 24-bit segments, which are interpreted
as four 6-bit segments for encoding. In this case, the first 6 bits equal:
1 0 0 0 0 1
32 + 0 + 0 + 0 + 0 + 1
Decimal 33 = Base64 h
Base64 Alphabet
Decimal Encod- Decimal Decimal Decimal
Value ing Value Encoding Value Encoding Value Encoding
0 A 1 B 2 C 3 D
4 E 5 F 6 G 7 H
8 I 9 J 10 K 11 L
12 M 13 N 14 O 15 P
16 Q 17 R 18 S 19 T
20 U 21 V 22 W 23 X
24 Y 25 Z 26 a 27 b
28 c 29 d 30 e 31 f
32 g 33 h 34 I 35 j
36 k 37 l 38 m 39 n
40 o 41 p 42 q 43 r
44 s 45 t 46 u 47 v
48 w 49 x 50 y 51 z
52 0 53 1 54 2 55 3
56 4 57 5 58 6 59 7
60 8 61 9 62 + 63 /
(pad) =
Contact Information
This section contains contact information for MasterCard personnel who can
assist members with e-commerce enrollment, testing, and implementation
issues.
Consumer Positioning....................................................................................................................C-1
Key Consumer Messages .........................................................................................................C-1
Consumer Positioning
MasterCard recommends the following positioning for consumer
communications and marketing:
Introducing MasterCard® SecureCode™: Your own private code for added peace
of mind when shopping online.
Each time you pay online at a participating merchant with your MasterCard card
or Maestro card, a message appears from your card issuer asking you for your
SecureCode—like the bank does at the ATM. In seconds, your issuer confirms it
is you and allows your purchase to continue.
• Market research has confirmed the stronger appeal of the term “SecureCode”
over the more common “password” or “PIN.”
• The first use (and the most prominent use if is not also the first use) of
the term “SecureCode”—indicating the secret code that cardholders enter
to authenticate themselves—should have a superscript “™”. Subsequent
uses of “SecureCode” on the same screen or document do not need to
include the “™”.
Communication Strategy
Communicating the availability of MasterCard SecureCode, and the cardholder
benefits it provides, are key to the success of the issuer’s program. This is
particularly true for Activation During Shopping (ADS) enrollment, where
cardholders must be educated about MasterCard SecureCode and notified
to expect the mid-purchase enrollment screen well in advance of their first
exposure.
Online Stategy
The following paragraphs describe the online strategy for positioning
SecureCode before consumers.
Issuer’s Site
The issuer’s site may contain a link to the informational pages at
www.mastercard.com/securecode or to other MasterCard consumer sites. These
pages include an explanation of what MasterCard SecureCode is and how it
works, a directory of participating merchants, links to participating issuers and a
frequently asked questions section. They also contain information specifically
targeted to cardholders who have never purchased online, which is designed to
allay their fears. Alternatively, issuers may wish to create their own Web pages,
to have on their own site, based on the www.mastercard.com/securecode pages.
Banner Ads
MasterCard recommends that banner ads be used on the issuer’s home page
and relevant consumer sites to encourage enrollment. Banners should link
to the issuer’s information or registration page. These ads may also link to
the information pages at MasterCard consumer Web sites with sections on
MasterCard SecureCode.
Acquisition Stategy
The broadest range of cardholders will enroll through a combination of
Activation During Shopping enrollment tactics and direct mail media. This
appendix reviews recommendations for each of those vehicles. In addition to
the direct mail communications, MasterCard also offers a variety of SecureCode
statement messages. With the advent of “phishing” and other spoof messages,
MasterCard no longer recommends the use of e-mail for acquisition purposes.
However, e-mail is effective for confirming enrollment.
DEFINITION
Phishing refers to the act of sending fraudulent e-mails to e-mail users. Typically, the goal of these
e-mails is to obtain personal information from the e-mail user with the intent to commit identity
theft.
Mail Vehicles
The following paragraphs outline how to position SecureCode before the
consumer using direct mail service.
Key Targets
Direct mail offers a way to reach cardholders who may be less Web-savvy
or unfamiliar with their issuer’s Web services. This more traditional form of
communication lets you reach the light-shoppers and non-shoppers.
Statement Inserts
Statement inserts and postcards can be used in any combination to remind
cardholders to register for MasterCard SecureCode. The first reminder should
be sent 2–3 weeks after the drop of the self-mailer. If the statement insert
schedule is full, the postcard may be used. The timing of this follow up is
critical to improve response rates.
Remind-to-Shop
Remind-to-shop postcards are another high-impact way to build usage,
particularly among those cardholders who may not have been comfortable
enough in the past to explore shopping on the Web.
Additionally, issuers developing their own media or software solutions must be-
come familiar with the MasterCard SecureCode Program Identifier Usage Guide-
lines available via the following Web address: www.mastercard.com/us/mer-
chant/security/what_can_do/pdf/SecureCode_logo_usage.pdf and other
pertinent requirements.
These data elements must be used by the acquirer when placing an Account
in Good Standing transactions. Each acquirer is responsible for determining
how this transaction is supported in the point of interaction message defined
for the merchant to acquirer interface.
To be eligible for this program the merchant must enable customers to register
on the merchant's Web site by selecting a username and password or similar
credentials, and provide cardholders with the option to register a MasterCard or
Maestro card number for use in future e-commerce transactions. The merchant
will also be expected to satisfy minimum security requirements intended
to help ensure the protection of all participants: the merchant, its acquirer,
the issuer, and the cardholder. The merchant must offer customers a safe,
secure shopping experience by using best practice risk management tools. In
addition, the merchant must demonstrate a commitment to conducting business
in a manner that does not result in excessive chargebacks. More information
about the program, including the program terms and the merchant enrollment
process, are available on MasterCard OnLine®. From the Main Menu, select
e-Business, then e-Commerce, and then click MasterCard and Maestro
Advance Registration Program.
Acquirer Impact
Participation in MARP is optional for Europe region acquirers. Acquirers outside
the Europe region are not eligible to participate in the program.
Acquirers that would like to enroll a merchant for the program may do so by
following the enrollment process that is available on MasterCard OnLine®.
From the Main Menu, select, e-Business, then e-Commerce, and then click
MasterCard and Maestro Advance Registration Program.
Issuer Impact
Any Maestro issuer that supports e-commerce is required to support the static
AAV in authorization. Issuers must ensure and meet existing European regional
requirements to support Maestro e-commerce transactions.
Overview
This chapter contains detailed information about the Issuer Implementation
Process for MasterCard® SecureCode™ including vendor selection, enrollment,
testing requirements, and more.
Testing Requirements
All issuers must participate in functional testing of their SecureCode
implementation prior to being issued production credentials. Upon receipt
of the signed SecureCode program enrollment forms, the SecureCode test
administrator will send all testing documentation to the member. Issuers
must return the completed testing enrollment form via e-mail message to
[email protected] to schedule a test session.
Testing Process
Issuers will perform the test cases detailed in the testing documentation and
submit the test results form and the .XML for each of the 3D secure messages
associated with each test case to MasterCard for review. All test results should
be sent via e-mail message to [email protected].
Completion of Testing
Upon successful approval of the test results and the screens, issuers must print,
sign, and mail the test results form to the SecureCode test administrator.
SecureCode in Production
Upon approval of the test results and screens, MasterCard will send a
Production Procedures guide to the issuer for guidance on requesting the
necessary certificates and for loading card ranges in the MasterCard SecureCode
directory server. The issuer is then approved for production and can launch
their program when ready.
NOTE
To prevent delay in customer live service, card ranges can be loaded prior to the production launch
date.
Overview
MasterCard recommends, but does not require, that issuers validate the SPA AAV
in real-time prior to generating the authorization response. In support of this
activity, MasterCard has made available an “on-behalf-of” SPA AAV validation
service.
Prerequisites
Issuers must be enrolled in the MasterCard® SecureCode™ program in order to
enroll for the on-behalf-of service. Issuers must ensure that their authorization
systems can accept the additional data in the authorization message indicating
the result of the AAV validation.
Approval of the enrollment application will result in the issuer being contacted
by several MasterCard groups who will work with the issuer to implement
this service.
Testing Requirements
There are two separate testing efforts involved in the implementation of this
service: authorization testing and testing the AAV validation.
Authorization Testing
Upon approval of the enrollment forms, issuers will be contacted by the
appropriate Customer Implementation Services team within MasterCard to
coordinate the authorization testing process. Authorization testing in support of
the AAV Validation service is required in all regions. Refer to the appropriate
specification manual for applicable test cases. Testing is performed via the
MasterCard credit and debit simulators only. Online testing is not available.
Key Management Team—The Key management team will work with the
Network Operations team to have the appropriate keys loaded into the
MasterCard production network. This takes approximately three business days.