|
Security Techniques
CCN
COMPUTER resources have worked with multiple techniques for transaction security
and fraud control. Some of these are:
|
|
|
- Encryption key
exchange process
|
- Interface to
security devices
|
|
|
- Message
Authentication Codes (MAC)
|
|
|
- EMV upgrades to
support VSDC and other products
|
|
|
|
|
|
|
|
|
|
Accesses
to all GUI screens of system are password protected. Only users with suitable
authentication and authorization can accesses system screens. All user-performed
changes are fully logged for the purpose of establishing an audit trail. Along
with the details of the changes performed by the user, the date, time and
user-id are also recorded.
Our
resources have also developed interfaces to physically secure devices. These
devices are used for all system encryption and decryption tasks such as:
PIN
block translation
PIN
creation
Message
authentication
Key
exchange and generation
PIN
mailer production
HSMs
can be connected to the system using the TCP/IP communication protocol.
Asynchronous protocol can be used with the HSM. Multiple HSMs can also be used
to improve transaction throughput.
|