Security

Mobile point of sale gets a PCI security standard

Because crooks salivate when you punch a PIN into a smartmobe at a market stall

By Richard Chirgwin

4 SHARE

The advent of mobile point-of-sale (MPOS) systems has been a boon for consumers and retailers of modest means, but the Payment Card Industry Security Standards Council's security wonks worried that they can't adhere to the strict hardware standards that merchants' credit card merchant terminals.

Hence the announcement [PDF] of a new standard that aims to advise merchants on how they can let you pay with a PIN on a mobile device without letting crims steal creds.

The standard's four key principles are that a service has to be actively monitored, in case a device like a phone or tablet is compromised; the PIN has to be isolated from other account data; ensuring the “software and integrity of the PIN entry application” on common off-the-shelf (COTS) devices; and protecting both PIN and account data “using a PCI approved Secure Card Reader-PIN (SCRP).”

As the PCI SSC's Troy Leach explains in this blog post, the aim is to “mitigate risks associated with a software-centric solution”.

The all-important isolation of account data from the PIN, Leach said, “happens as the Primary Account Number (PAN) is never entered on the mobile device with the PIN. Instead that information is captured by an EMV Chip reader that is approved as a Secure Card Reader for PIN (SCRP) that encrypts the contact or contactless transaction.”

Back-end security controls include “attestation (to ensure the security mechanisms are intact and operational), detection (to notify when anomalies are present) and response (controls to alert and take action) to address anomalies,” Leach said.

As well as security requirements, which apply to companies providing the payment solutions, the standard includes a test requirements document. Leach said the test requirements, which will be published in February, “create validation mechanisms for payment security laboratories to evaluate the security of a solution”.

As devices pass the Council's testing, they'll be listed on its Web site. ®

Sign up to our NewsletterGet IT in your inbox daily

4 Comments

More from The Register

Hey you smart, well-paid devs. Stop clicking on those phishing links and bringing in malware muck on your shoes

At Node Summit, coders served some humble pie

Phishing scum going legit to beat browser warnings

Now that Chrome and Firefox call out HTTP, phisherpholk are getting certified

SoftNAS no longer a soft touch for hackers (for now)... Remote-hijacking vulnerability patched

Your files are someone else's files, too, thanks to storage bug

Gmail is secure. Netflix is secure. Together they're a phishing threat

Google doesn't recognise dots in email addresses, which creates an opportunity for evil

Git security vulnerability could lead to an attack of the (repo) clones

Best git patching y'all

Don't fear 1337 exploits. Sloppy mobile, phishing defenses a much bigger corp IT security threat

AppSec EU DARPA-funded white hat emits timeless advice

Microsoft emergency update: Malware Engine needs, erm, malware protection

Stop appreciating the irony and go install the patch now

Here's some phish-AI research: Machine-learning code crafts phishing URLs that dodge auto-detection

Humans, keep your eyes out for dodgy web links

MailChimp 'working' to stop hackers flinging malware-laced spam from accounts

What can you do about it for now? Sweet 2FA

OpenFlow protocol has a switch authentication vulnerability

It's old, it's everywhere and it's not likely to be fixed in a hurry