DeBarra Innovations Limited

YES, WE AGREE
YES, AS A GENERAL ASSUMPTION, PROVIDED THAT THE LOGICAL SEQUENCE OF ACTIONS REQUIRES THAT THE “DYNAMIC LINKING” MUST BE EXECUTED IN SPECIFIC STEPS OF THE AUTHENTICATION PROCESS
 provide evidence to support the views expressed/ rationale proposed;
The “Dynamic Linking” must be related to each single payment transaction and therefore must be executed AFTER the presentation to the customer of the significant details (Merchant Name & Id, Total amount) of the payment transaction and BEFORE the execution of the authorization request, which is equivalent to state that “the authentication procedure will allow the customer to identify the significant payment details before the execution of the payment authorization procedure”
 provide alternative regulatory options for consideration by the EBA.
For on-line transaction the authentication procedure shall allow the customer to identify the significant payment details before the execution of the payment authorization procedure and therefore the ‘dynamic linking’ procedure will be executed after the presentation by the payee to the payer of the significant payment details (at least Merchant Name & Id, Total amount) and before the payment authorization procedure is started.
SOCIAL ENGINEERING AND HUMAN FACTORS SHOULD BE CONSIDERED AS ADDITIONAL THREATS, ALONG WITH THE TECHNICAL FACTORS, TO REDUCE THE POSSIBILITY THAT A PAYMENT SERVICE USER SHOULD “VOLUNTARILY” DISCLOSE HIS/HER OWN PERSONAL CREDENTIALS TO UNAUTHORIZED AGENTS OR SYSTEMS.
 provide evidence to support the views expressed/ rationale proposed;
The strong authentication procedure will protect the payer (and the payee) from involuntary disclosure of their secret(s) (secure credentials), but such a condition might not be completely satisfied in the case a “social engineering” action should be so accurate to misguide the payer (and the payee) to lead him(her) to disclose his own secret (secure credentials) to a third party. Human factors related to the personnel employed into processing systems should also be considered in the implementation of the system(s) and their management.
 provide alternative regulatory options for consideration by the EBA.
Actions should be taken by all processors/entities involved in the strong authentication system(s) to protect their customers from social engineering actions and to protect their systems from disloyal personnel.
YES, WE AGREE
YES, WE ARE CONCERNED BY THE FACT THAT THE CUMULATIVE RISK (SYSTEMIC RISK) FOR THE PAYMENT SYSTEM MAY BE VERY HIGH AND THERE ARE EXISTING METHODS TO PERFORM STRONG AUTHENTICATION IN A CONTACTLESS ELECTRONIC PAYMENT TRANSACTION EXECUTED WITH A MOBILE DEVICE. MOREOVER, EMERGING TECHNOLOGIES SUCH AS RADIO BEACONS, BLUETOOTH LOW ENERGY ETC. WILL ALLOW NEW INTERACTION MODELS WHICH WILL BENEFIT FROM STRONG CUSTOMER AUTHENTICATION PAYMENTS SECURITY.
 provide evidence to support the views expressed/ rationale proposed;
Patent WO2015104387A1 is describing a “System and method for communicating credentials” which can be applied to any Use Case, including on-line and off-line contactless transactions.
 provide alternative regulatory options for consideration by the EBA.
i. the SCA will be executed transparently for the Payment Service User and acceptor for contactless electronic payment transactions which do not exceed the maximum amount of 25 EUR on the basis of SCA methods which will allow both on-line and off-line payment transaction processing.

ii. the SCA will be executed with the participation of the Payment Service User for contactless electronic payment transactions which are equal or exceed the maximum amount of 25 EUR on the basis of SCA methods which will allow both on-line and off-line payment transaction processing.
YES, WE AGREE, ALTHOUGH THERE MAY EXIST METHODS TO REDUCE THE SENSITIVITY FROM BREACHES IN USERS’ PERSONALIZED SECURITY CREDENTIALS BREACHES.
YES, WE AGREE
YES, WE AGREE, THE ONLY CONSTRAINT WILL BE THE LENGTH OF MESSAGES, WHICH MAY IMPACT ON SPEED OF TRANSACTIONS AND COMMUNICATION COSTS
GIVEN THE DIFFERENT LEVELS OF TRUST DUE TO THE DIFFERENT LEVEL OF PROTECTION FOR DIFFERENT TYPES OF DEVICES DUE TO THE DIFFERENT HARDWARE COMPUTING CAPABILITIES AND OPERATING SYSTEMS WE WOULD PROPOSE TO USE “SEGREGATED” WEB CERTIFICATES DEPENDING ON THE TYPE OF DEVICES USED.

 provide evidence to support the views expressed/ rationale proposed;
The type and complexity of the Certificate may differ, depending on the computing capabilities of the devices; Computers computing capabilities may be higher than the ones of tablets or mobile phones.
 provide alternative regulatory options for consideration by the EBA.
Web site certificates issued by qualified trust service providers may have different type and complexity depending on the type of devices they are going to reside on.
[IT services provider "]"
[Other"]"
Other Financial Intermediation Services - IT and Authentication Services
Yes
claudio.canella@secureprivity.com
Claudio Canella - Vice President Payment Technical Operations
+393355387925
Yes