VASCO Data Security

We do generally agree but we would like to submit following feedback and questions:
- In Article 2, Item 2b, it is stated that: The channel, device or mobile application through which the information linking the transaction to a specific amount and a specific payee is displayed shall be independent or segregated from the channel, device or mobile application used for initiating the electronic payment transaction." We understand that, in the situation where a mobile device is used, there should be at least two independent mobile applications: one to initiate the transaction and one to generate the authentication code. But it is unclear to us whether it is possible to use two different apps on the same device. Can you clarify this point?
- In Article 6, are items 3a and 3b both mandatory, or does one suffice? Does item 3a, which requires the implementation of separated trusted execution environments inside multi-purpose devices, implies e.g. using the Trusted Execution Environment on mobile phones to generate the authentication codes?"
NA
NA
NA
NA
We do generally agree but we would like to submit following feedback and questions:
- In Article 9, Item 1c, it is stated that secret cryptographic material related to the encryption of the credentials shall be stored in secure and tamper resistant devices and environments. Does this apply to both the backend and the client devices? Can you provide some examples that would be allowed on mobile devices? Is a secure element / TEE required, or can software-only mechanisms be used as well?
- In Article 12, Item b, it is stated that the association via a remote channel of the payment services user’s identity with the personalised security credentials, with a payment instrument and with authentication devices or software shall be performed using the strong customer authentication procedure.” According to us, this is infeasible as it means that the provisioning shall be protected by an OTP, which can only be generated after the provisioning. Can you clarify how to solve this problem practically?"
NA
NA
NA
NA
[IT services provider "]"
[Other"]"
Strong authentication and IT security
Ludovic Joly