advertisement
advertisement

This is page 2 of:

Playing Token Trick Or Treat

September 30th, 2010

You may want to use automated data discovery tools to locate where PAN data may have leaked. A wide array of good open-source and vendor tools can help you.

  • How will the tokens be generated?
    This is perhaps the most important question you can ask at the first meeting with any vendor (or with your IT security staff, if you are thinking of a homegrown approach).

    Without going into a great deal of detail, there are at least three widely discussed methods to generate a token. The first and, in my opinion, best method is to replace the PAN with a string of random numbers. This approach is secure, and it is not reversible.

    You or a vendor could generate tokens with a one-way hash using a cryptographic salt. The resulting value should not be reversible. However, depending on the implementation, this value is not as secure as a random number. You also cannot store or transmit the truncated PAN together with the tokenized data if you take this approach.

    Alternatively, you could use encryption to generate a token. But this is encryption, not truly tokenization. Because encryption is reversible, any token generated in this way would be reversible, too. If this approach is appealing, I suggest you await further guidance from the PCI Council.

    Other approaches are available for generating tokens, some of which are as simple as using a sequence number to replace parts of the PAN. Whichever approach you take to generate tokens, make sure it actually removes the PAN data from your PCI scope. You don’t want your database to be “compliant,” you want it out of scope.

  • Where in the payment process will tokenization take place?
    Because the whole point of tokenization is to reduce your PCI scope, the fewer systems and network segments that actually touch PAN data, the better. Therefore, the closer the tokenization process is to your POS, the more your scope can be reduced.

    In some implementations, a PAN goes from the POS to the application, where a token is created (either in the application or by sending it to the tokenization vendor). This approach is good, but it is even better if the PAN can go from the POS directly to the token engine—bypassing the application entirely. Ideally, you would like to get all the way to the magnetic head in the card reader, if possible.

  • Can you de-tokenize your data or get back from a token to a PAN?
    This question gets to the heart of the PCI scoping issue. Whether you have internal tokenization or rely on a third party, the tokenization system should not send a PAN to a token recipient. Wherever a PAN is sent, that system is in your PCI scope.

    Retailers considering third-party packages should review the PCI Council’s guidance on encrypted data: “encrypted data may be deemed out of scope if, and only if, it has been validated that the entity that possesses encrypted cardholder data does not have the means to decrypt it.” Applying this guidance to tokenization means that if you can ever get back to a PAN—whether electronically or by calling the vendor and having it send you a few thousand account numbers for “testing”—you may not be reducing your scope as much as you expect.

  • How will you tokenize your legacy PAN data?
    This question ties back to the first question and assumes you have identified all the places you have PAN data. Certainly, the ideal situation would be to purge your old PAN data. If, however, this is not possible, you might want to check into provisions for tokenizing those databases, too.

    We will go through the rest of the list of 10 questions in my next column. In the meantime, I’d like to hear what questions you are asking. Have you implemented tokenization? What questions did you ask and what lessons did you learn? I’d like to hear your thoughts. Either leave a comment or E-mail me at wconway@403labs.com.


  • advertisement

    Comments are closed.

    Newsletters

    StorefrontBacktalk delivers the latest retail technology news & analysis. Join more than 60,000 retail IT leaders who subscribe to our free weekly email. Sign up today!
    advertisement

    Most Recent Comments

    Why Did Gonzales Hackers Like European Cards So Much Better?

    I am still unclear about the core point here-- why higher value of European cards. Supply and demand, yes, makes sense. But the fact that the cards were chip and pin (EMV) should make them less valuable because that demonstrably reduces the ability to use them fraudulently. Did the author mean that the chip and pin cards could be used in a country where EMV is not implemented--the US--and this mis-match make it easier to us them since the issuing banks may not have as robust anti-fraud controls as non-EMV banks because they assumed EMV would do the fraud prevention for them Read more...
    Two possible reasons that I can think of and have seen in the past - 1) Cards issued by European banks when used online cross border don't usually support AVS checks. So, when a European card is used with a billing address that's in the US, an ecom merchant wouldn't necessarily know that the shipping zip code doesn't match the billing code. 2) Also, in offline chip countries the card determines whether or not a transaction is approved, not the issuer. In my experience, European issuers haven't developed the same checks on authorization requests as US issuers. So, these cards might be more valuable because they are more likely to get approved. Read more...
    A smart card slot in terminals doesn't mean there is a reader or that the reader is activated. Then, activated reader or not, the U.S. processors don't have apps certified or ready to load into those terminals to accept and process smart card transactions just yet. Don't get your card(t) before the terminal (horse). Read more...
    The marketplace does speak. More fraud capacity translates to higher value for the stolen data. Because nearly 100% of all US transactions are authorized online in real time, we have less fraud regardless of whether the card is Magstripe only or chip and PIn. Hence, $10 prices for US cards vs $25 for the European counterparts. Read more...
    @David True. The European cards have both an EMV chip AND a mag stripe. Europeans may generally use the chip for their transactions, but the insecure stripe remains vulnerable to skimming, whether it be from a false front on an ATM or a dishonest waiter with a handheld skimmer. If their stripe is skimmed, the track data can still be cloned and used fraudulently in the United States. If European banks only detect fraud from 9-5 GMT, that might explain why American criminals prefer them over American bank issued cards, who have fraud detection in place 24x7. Read more...

    StorefrontBacktalk
    Our apologies. Due to legal and security copyright issues, we can't facilitate the printing of Premium Content. If you absolutely need a hard copy, please contact customer service.