Justification for End to End Encryption [ATM, Debit & Prepaid Forum 2009]

Vicki T

October 19, 2009

The second Keynote speaker for the ATM, Debit & Prepaid Forum 2009 was Robert O. Carr, Chairman and CEO, Heartland Payment Systems.  Proud of their reputation for full disclosure with merchants, they had to put it to the test with their Jan 20, 2009 announcement of their data breach.

PCI compliance is intended to target data at rest.  One of the things that changed after the Hannaford payment breach announced in March 2008, and also in the Heartland example is that the criminals targeted data in-motion.   Additional potential techniques for added security include:

  • Chip & PIN
  • Tokenization
  • End-to-end encryption (E3)
  • Dynamic Data Authentication

Heartland has shown an interest in end-to-end encryption with Voltage and dynamic data authentication.  Visa recently published new global industry best practices for data field encryption (see Payments News post here).

Interestingly Heartland is not pursuing tokenization, which has gained traction in some merchant environments.  Tokenization is one of several approaches used by merchants to avoid handling and storing a bankcard PAN (primary account number).  The merchant uses a token or hash of the PAN to represent the customer in their systems.  Should they need to identify the card information, the token provider can decode the token.  This approach is best suited to protecting long-term data storage of card data and is already in use at a number of major merchants particularly to support their understanding of customer purchases for loyalty programs.

Who better to lead the charge for End-to-end encryption?  Heartland has developed a framework and a strategy for E3.  They have been working with American National Standards Institute to support standards and FS-ISAC to support anonymous sharing of data amongst competitors.  The cost of their data breach experience should provide other companies justification to invest in new technologies and approaches to protect cardholder data.

Recent Payment Views

Payments Post #13: At the Intersection of Tech, Regs, and Business Partnership

Payments Post #13: At the Intersection of Tech, Regs, and Business Partnership

This month, Cici Northup joins regular contributor Justin Pituch to recap positive news in the form of fast payments growth, new fraud mitigation strategies, and evolution in cross-border transfers. All reflect, to varying degrees, the unique dynamic in the payments industry created by the intersection of technology, regulation, and new business partnerships.

read more
Payments Orchestration: What Comes Next?

Payments Orchestration: What Comes Next?

Orchestration providers have certainly come a long way, and can enable powerful capabilities and benefits for the merchants that employ them. This post explores some of the possibilities Glenbrook has been thinking about for where Orchestration (and even orchestration) can go next.

read more
Payments Post #13: At the Intersection of Tech, Regs, and Business Partnership

Payments Post #12: Lessons from Change

In this month’s Payments Post, we want to draw your attention to several recent fraud incidents that underscore the criticality of effective risk management to your business and the safety and soundness of the payments industry.

read more

Glenbrook Payments Boot CampTM workshop

Register for the next Glenbrook Payments Boot Camp®

An intensive and comprehensive overview of the payments industry.

Train your Team

Customized, private Payments Boot CampsTM workshops tailored to meet your team’s unique needs.

OnDemand Modules

Recorded, one-hour videos covering a broad array of payments concepts.

GlenbrookTM Company Press

Comprehensive books that detail the systems and innovations shaping the payments industry.

Launch, improve & grow your payments business