Response to discussion on RTS on strong customer authentication and secure communication under PSD2

Go back

1. With respect to Article 97(1) (c), are there any additional examples of transactions or actions implying a risk of payment fraud or other abuses that would need to be considered for the RTS? If so, please give details and explain the risks involved.

With respect to Article 97(1) (c), we understand that the examples offered by EBA are enough to provide clarity.

2. Which examples of possession elements do you consider as appropriate to be used in the context of strong customer authentication, must these have a physical form or can they be data? If so, can you provide details on how it can be ensured that these data can only be controlled by the PSU?

CyberSource considers that we must strike a balance between security and convenience. We must therefore be flexible when considering possession elements with the aim of improving merchant sales. Increasing the friction at checkout by introducing strong customer authentication may impact the number of orders that merchants are able to convert to sales.

Possession elements can have either a physical form or they can be data. A good example of a possession element could be the mobile device fingerprint, which is created from a variety of data that is compiled from the PSU’s mobile device after they grant access. A mobile device is typically only controlled by the PSU, as it is portable and can be carried anywhere (unlike, for example, a desktop). Another example would be an application on the device which generates random numbers.

3. Do you consider that in the context of “inherence” elements, behaviour-based characteristics are appropriate to be used in the context of strong customer authentication? If so, can you specify under which conditions?

We consider that “inherence” elements should be used in the context of strong customer authentication. There are many merchants that are currently using behaviour patterns to determine when a transaction could be fraudulent, with a high degree of success. PSUs can display buying patterns that match previous orders (the device used, IP address, goods or services bought, delivery address, departure airport, etc.). When a current order matches previous purchases, the merchant can infer that it is the PSU making the transaction. When there are variations in the buying patterns, there could be an additional layer of security to confirm that it is the PSU.

However, given that there are multiple variations depending on the goods/services sold and the industry the merchant belongs to, we consider the EBA should not provide a closed list of elements that it considers suitable for “inherence”.

CyberSource has a product called Decision Manager that allows a merchant to screen orders for fraud. The merchant sends additional behavioural information on the order, such as IP address, goods or services bought, delivery address, etc. to the Decision Manager platform. This platform then calculates a risk score that can be increased or decreased by the merchant based on their knowledge of the business. For example, if the PSU has purchased several times at the merchant without any fraud problem, the merchant may decide to reduce the risk associated to the transaction. If, on the contrary, the PSU is a new customer, purchasing a large amount of goods that the merchant associates with fraud, then the merchant may decide to increase the risk associated with the transaction. The score will then enable the merchant to determine whether to accept, reject or send the transaction to one of its customer service agents to review manually.

4. Which challenges do you identify for fulfilling the objectives of strong customer authentication with respect to the independence of the authentication elements used (e.g. for mobile devices)?

The use of one-time passwords (“OTPs”) sent to mobile devices may compromise the independence of the authentication elements used. However, this would only result in the “possession” element being compromised (in the case of theft of the device, for example). This compromise might be overcome with either of the other two elements, “knowledge” or “inherence”. The use of data tools such as Decision Manager, for example, help merchants identify when a device might have been compromised, by using additional information to make a decision. The buying patterns of fraudsters will not match the buying patterns of the genuine PSU.

We consider that the main challenge for fulfilling the objectives of strong customer authentication is that the solutions that are based on the RTS should be consumer-friendly, so that when they are implemented in the marketplace they do not prevent customers making legitimate purchases conveniently or penalise sales from merchants. For instance, a customer may not have a mobile device immediately to hand for the purpose of receiving OTPs. Customers might also compromise the independence of authentication elements in order to improve convenience; or otherwise limit or stop shopping via remote/cross-border channels.

5. Which challenges do you identify for fulfilling the objectives of strong customer authentication with respect to dynamic linking?

The circumstances of a transaction may vary between the moment when authentication is requested and delivery. There may be goods that are not available when the order is due to be shipped; or the customer may have agreed to allow the substitution of items. In a grocery sales scenario, for example, some goods may be of variable weight, so the final amount of the order may not be known when authentication takes place.

There are already data elements within 3-D Secure transactions that allow for the integrity of the transaction, without the need to include dynamic linking to a specific amount.

6. In your view, which solutions for mobile devices fulfil both the objective of independence and dynamic linking already today?

Any solution that uses additional behavioural information in relation to transactions and which is based on customer profiles (with customer consent, where necessary) fulfils the objective of independence and dynamic linking. In addition, the current data elements included within card transactions in 3-D Secure guarantee the integrity of the transaction.

7. Do you consider the clarifications suggested regarding the potential exemptions to strong customer authentication, to be useful?

We understand that the clarifications regarding exemptions to strong customer authentication are useful and help understanding the PSD2’s article (paragraph 42). However, we do not consider it necessary for the EBA to detail the kind of information and capabilities required in its future regulatory technical standards. There are several providers in the market that supply these kinds of services (CyberSource is one of them) and the way that each company approaches transaction risk analysis is different. Providing a fixed set of requirements could compromise the business model of any one of these service providers.

Merchants should be allowed to decide when to try to authenticate the PSU and when not. It may be that the issuer of the payment instrument has an underperforming system, in which case the merchant should be allowed to use an inherence element, such as behavioural data, as part of strong customer authentication as an alternative to making an authentication request to the issuer. It is our view that the card schemes rules and related contracts between card scheme participants already provide the allocation of liability between the different parties in a transaction (issuer or acquirer). The RTS should include sufficient flexibility to allow merchants to bear the risk of the transaction where authentication is deemed impracticable, without any impact on the PSU’s rights in the event that the transaction turns out to be fraudulent.

8. Are there any other factors the EBA should consider when deciding on the exemptions applicable to the forthcoming regulatory technical standards?

The use of smartphones for purchases should be considered for an exemption in the forthcoming regulatory technical standards. Although screens are getting bigger with each new model that is launched in the market, the number of transactions that are converted to sales experienced when using smartphones is lower than with other devices (desktops, tablets).

Another exemption the RTS should consider is one of the most successful order conversion tools in the market, storing card details on file (either by a merchant who complies with PCI DSS or by providers of ‘tokenisation’ services), so that it may be used for successive purchases. This is highly valuable for merchants that have returning customers, which are usually offered a simplified checkout. Strong customer authentication is usually required for the first transaction, but is not required for the subsequent transactions, as “inherence” would allow the merchant to determine whether the PSU is really a returning customer.

9. Are there any other criteria or circumstances which the EBA should consider with respect to transaction risks analysis as a complement or alternative to the criteria identified in paragraph 45?

As mentioned in the response to question 7, we do not consider that there should be detailed or exhaustive list(s) of criteria included in the regulatory technical standards,
and each merchant/provider should be capable of developing their own specific criteria.

10. Do you consider the clarification suggested regarding the protection of users personalised security credentials to be useful?

NA

11. What other risks with regard to the protection of users’ personalised security credentials do you identify?

NA

12. Have you identified innovative solutions for the enrolment process that the EBA should consider which guarantee the confidentiality, integrity and secure transmission (e.g. physical or electronic delivery) of the users’ personalised security credentials?

NA

13. Can you identify alternatives to certification or evaluation by third parties of technical components or devices hosting payment solutions, to ensure that communication channels and technical components hosting, providing access to or transmitting the personalised security credential are sufficiently resistant to tampering and unauthorized access?

NA

14. Can you indicate the segment of the payment chain in which risks to the confidentiality, integrity of users’ personalised security credentials are most likely to occur at present and in the foreseeable future?

NA

15. For each of the topics identified under paragraph 63 above (a to f), do you consider the clarifications provided to be comprehensive and suitable? If not, why not?

NA

16. For each agreed clarification suggested above on which you agree, what should they contain in your view in order to achieve an appropriate balance between harmonisation, innovation while preventing too divergent practical implementations by ASPSPs of the future requirements?

NA

17. In your opinion, is there any standards (existing or in development) outlining aspects that could be common and open, which would be especially suitable for the purpose of ensuring secure communications as well as for the appropriate identification of PSPs taking into consideration the privacy dimension?

NA

18. How would these requirement for common and open standards need to be designed and maintained to ensure that these are able to securely integrate other innovative business models than the one explicitly mentioned under article 66 and 67 (e.g. issuing of own credentials by the AIS/PIS)?

NA

19. Do you agree that the e-IDAS regulation could be considered as a possible solution for facilitating the strong customer authentication, protecting the confidentiality and the integrity of the payment service users’ personalised security credentials as well as for common and secure open standards of communication for the purpose of identification, DP on future RTS on strong customer and secure communication under PSD2 31 authentication, notification, and information? If yes, please explain how. If no, please explain why.

NA

20. Do you think in particular that the use of “qualified trust services” under e-IDAS regulation could address the risks related to the confidentiality, integrity and availability of PSCs between AIS, PIS providers and ASPSPs? If yes, please identify which services and explain how. If no, please explain why.

NA

Name of organisation

CyberSource Ltd

Please select which category best describes you and/or your organisation.

[Other"]"

If you selected ‘Other’, please provide details

Payment gateway and fraud management solutions

Please select which category best describes you and/or your organisation.

[Other "]"

If you selected ‘Other’, please provide details

Payment gateway and fraud management solutions