{"id":856,"date":"2007-09-11T09:07:42","date_gmt":"2007-09-11T17:07:42","guid":{"rendered":"\/?p=856"},"modified":"2007-09-11T09:12:34","modified_gmt":"2007-09-11T17:12:34","slug":"managed-information-cards-for-secure-online-purchasing","status":"publish","type":"post","link":"https:\/\/www.identityblog.com\/?p=856","title":{"rendered":"Managed information cards for secure online purchasing"},"content":{"rendered":"<p><a href=\"http:\/\/blog.pingidentity.com\/blog\/default\/\" class=\"broken_link\">Here&#39;s news<\/a> of&nbsp;an&nbsp;important&nbsp;technology demonstration from Ping Identity and ACI Worldwide at the upcoming <a href=\"http:\/\/conference.digitalidworld.com\/2007\/\">DIDW Conference <\/a>(just&nbsp;two weeks away in San Francisco in case you have forgotten to register).<\/p>\n<p>To put this in context, ACI Worldwide is the world leader in retail payments &#8211; over half the plastic card transactions in the world (55 billion last year) go through ACI&#39;s software at banks, merchants and networks in over 85 countries.<!--more--><\/p>\n<p>The presentations will include a discussion of how,&nbsp; &#8220;the 3D-Secure protocol used by Visa, MasterCard, and JCB, as well as the PayPal protocol, could easily be adapted to support Information Card&#8221;.<\/p>\n<p>The&nbsp;work is the result of a collaboration&nbsp;by Sid Sidner,&nbsp;the architect for ACI\u00e2\u20ac\u2122s virtual SET wallet and 3D-Secure products,&nbsp;and Ping&#39;s <a href=\"http:\/\/itickr.com\/\" class=\"broken_link\"><font color=\"#000066\">Ashish Jain<\/font><\/a> and Patrick Harding.&nbsp;&nbsp;Ping&#39;s backgrounder says:<\/p>\n<blockquote><p>&#8220;The identity metasystem concept embodied in Information Cards has applications beyond pure authentication.&nbsp; For example, Information Cards could be excellent for supplying payment data to an e-commerce merchant during a purchase.<\/p>\n<p>&#8220;It would go like this: A payment provider such as a bank or PayPal issues a consumer a payment Information Card.&nbsp; Then the consumer can use it at participating merchants.&nbsp; They simply click a button which activates the identity selector software on their PC, phone, or set-top box &#8211; an identity selector like Microsoft&#39;s CardSpace or any of the other ones being developed.&nbsp; The consumer selects the payment Information Card of their choice, enters their PIN, and the identity selector gets the payment information from the payment provider and returns it to the merchant.<\/p>\n<p>&#8220;The consumer will like it because they don&#39;t have to type in the card number, expiration date, CVV, and billing address.&nbsp; The merchant will like it because the clickpath to order submission is shorter; they will should get better merchant fees and fraud risk; and they don&#39;t have to store sensitive cardholder information in their databases.&nbsp; The payment provider will like it because they can dramatically lower their e-commerce fraud.<\/p>\n<p>&#8220;An exciting aspect of this is that the 3D-Secure protocol used by Visa, MasterCard, and JCB, as well as the PayPal protocol could easily be adapted to support Information Cards.&#8221;<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>ACI and Ping explore how the 3D Secure credit card model meshes with infocard protocols<\/p>\n","protected":false},"author":68,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[6,15,4],"tags":[],"_links":{"self":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/856"}],"collection":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=856"}],"version-history":[{"count":0,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=\/wp\/v2\/posts\/856\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=856"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.identityblog.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}