Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
EMV: why payment systems fail
Anderson R., Murdoch S. Communications of the ACM57 (6):24-28,2014.Type:Article
Date Reviewed: Jul 8 2014

This article outlines lessons from the European deployment of smart cards. The intended audience is not coders, but system designers from banks, merchants, regulators, and consumers. European experience should be useful in the US, although the context is somewhat different as consumer protection is more strongly entrenched in the US, and the real battle will probably be about interchange fees, $30 billion, rather than fraud, $3 or $4 billion.

In any case, the full effect of implementing smart cards will not be felt for many years until all automated teller machines (ATMs) and point-of-sale (POS) terminals have been updated; newly issued smart cards will continue to have a magnetic strip. Customer identification with smart cards can be done with a personal identification number (PIN) verified on the card or using the existing signature procedure. Some US banks will use PINs, others signatures.

The article describes various fraudulent techniques. In the UK, some terminals were not tamper-proof. Fraud losses actually increased in the UK after smart cards were introduced, although they subsequently declined. The increase also reflects card-not-present (CNP) fraud, transactions through the Internet. Another fraud, relay attack, used a fake terminal to gain access to a customer’s account. In other frauds, random numbers used in transactions were predictable by accessing a stolen telephone.

A stolen card can be used without knowing the PIN through a device between the card and the terminal causing the terminal to believe the card verifies with a signature. The use of PINs puts the customer at a disadvantage in dispute resolution. This article is readable, even fascinating.

Reviewer:  B. Hazeltine Review #: CR142479 (1412-1106)
Bookmark and Share
  Reviewer Selected
Featured Reviewer
 
 
Security and Protection (K.6.5 )
 
 
Electronic Commerce (K.4.4 )
 
 
Public Policy Issues (K.4.1 )
 
Would you recommend this review?
yes
no
Other reviews under "Security and Protection": Date
CIRCAL and the representation of communication, concurrency, and time
Milne G. ACM Transactions on Programming Languages and Systems 7(2): 270-298, 1985. Type: Article
Oct 1 1985
Computer security risk management
Palmer I., Potter G., Van Nostrand Reinhold Co., New York, NY, 1989. Type: Book (9780442302900)
Apr 1 1991
Computers at risk
, National Academy Press, Washington, DC, 1991. Type: Book (9780309043885)
Oct 1 1991
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy