The 3-D Secure protocol version 1.0, marketed under different
names by different payment networks (Verified by Visa, MasterCard
SecureCode, American Express SafeKey, etc.) aims at reducing online
credit card fraud by authenticating the cardholder. To that purpose,
the merchant’s web site redirects the cardholder’s browser to the
issuing bank, which typically authenticates the cardholder by asking
for a static password and/or a one-time password delivered to a
registered phone number. 3-D Secure was introduced by Visa in 1999,
but it is still unevenly used in European countries and rarely used in
the United States. One reason for the limited deployment of 3-D
Secure is the friction caused by requiring users to remember and enter
a password and/or retrieve and enter a one-time password. Consumers
“hate” 3-D Secure 1.0, and merchants are wary
of transaction abandonment. Another reason may be that it facilitates
phishing attacks by asking for a password after redirection, as
discussed
here,
here, and
here.
3-D Secure 2.0
aims at reducing that friction. When 3-D Secure 2.0 is deployed, it
will introduce a frictionless flow that will eliminate
cardholder authentication friction for 95% of transactions deemed to
be low risk. But it will do so by eliminating cardholder
authentication altogether for those transactions. The merchant
will send contextual information about the intended transaction to the
issuer, including the cardholder’s payment history with the merchant.
The issuer will use that information, plus its own information about
the cardholder and the merchant, to assess the transaction’s risk, and
will communicate the assessment to the merchant, who will redirect the
browser to the issuer for high risk transactions but omit
authentication for low risk ones.
This new version of 3-D Secure has serious drawbacks. It is
privacy invasive for the cardholder. It puts the merchant in a bind,
who has to keep customer information for the sake of 3D-Secure while
minimizing and protecting such information to comply with privacy
regulations. It is complex for the issuer, who has to set up an AI
“self-learning” risk assessment system. It requires
expensive infrastructure: the contextual information that the merchant
sends to the issuer goes through no less than three intermediate
servers—a 3DS Server, a Directory Server and an Access Control
server. And it provides little or no security benefit for low risk
transactions, as the cardholder is not authenticated and the 3-D
Secure risk assessment that the issuer performs before the merchant
submits the transaction to the payment network is redundant with the
risk assessment that it performs later before authorizing or declining
the submitted transaction forwarded by the payment network.
There is a better way. In a Pomcor
technical report we propose a scheme for securing online credit
card payments with two-factor authentication of the cardholder without
adding friction.
Continue reading “Frictionless Secure Web Payments without Giving up on Cardholder Authentication”