!!! Overview [{$pagename}] is a [Mobile-Digital Wallet] system. [{$pagename}] works using a device-based [Secure Element]. [1] [{$pagename}] does not store the real card or token data in their cloud servers. The on-device [Secure Element] essentially performs [Card-Emulation] in addition to secure storage. [{$pagename}] sends payment data to the contactless terminal when you Tap & Pay utilizing [NFC] and the [EMVCo’s Contactless suite of specifications|http://www.emvco.com/specifications.aspx?id=21 |target='_blank'] to communicate with the contactless reader terminal. [{$pagename}] does not store the real card data inside the [Secure Element]. This is in direct contrast to [Google Wallet] and [Softcard]. [{$pagename}] stores a token that conforms to [EMVCo Tokenization] specification. This token (along with a cryptogram) that gets sent to the contactless terminal. [Apple] refers to the "Device Account Number" (PAN) as the EMVCo token in their documentation.[2] During the authorization flow, the card network identifies the token, de-tokenizes them into real [PAN] with the help of a Token Service Provider (TSP) and sends the real [PAN] over to Issuer for authorization. Since Apple owns and controls the [Secure Element] embedded inside the device thereby avoiding unnecessary challenges from the [MNO]s. !! [Secure Enclave] and [Touch ID] Each [{$pagename}] transaction is authenticated using [Touch ID] or the user’s passcode. The [Secure Enclave] manages the [Authentication] process and enables a payment transaction to proceed. As far as we can tell, other than the [Authentication] process, neither the [Secure Enclave] or [Touch ID] are involved in the [{$pagename}] process. Could there be some [Cryptography] Functions involved? !! How it Works ! Adding a Card to [{$pagename}] When a customer adds a [Payment Card] to their wallet, the [PAN] details are submitted to Apple Pay servers. Apple Pay sends the information over to the corresponding [Issuer Bank|Card Issuer] asking for a [Payment Token] in return. The [Issuer Bank|Card Issuer] calls a Token Service Provider (TSP) and requests for a [Payment Token]. As far as we know, the payment network themselves play the role of TSP at present. The TSP vaults the [PAN], maps it to a [Payment Token] and returns the token and a [Payment Token-Key]. The [Issuer Bank|Card Issuer] receives a token and [Payment Token-Key], and adds a [CVV-Key] to the mix. The [Issuer Bank|Card Issuer] returns the [Payment Token], [Payment Token-Key] and [CVV-Key] back to Apple Pay. Apple Pay, acting as its own [Trusted Service Manager] ([TSM]) provisions the [Payment Token], [Payment Token-Key] and [CVV-Key] and maybe other data into the [Secure Element]. This combination is the "Token" that Apple calls as "Device Account Number" [DAN] in its press releases. !! Making a POS Payment When a customer taps or waves their iPhone in front of a point of sale terminal, a payment transaction is initiated. Apple Pay uses [EMVCo’s Contactless Suite of Specifications] to communicate with the contactless reader terminal. When it is time for the [Secure Element] to send information to the terminal: * First, the [Secure Element] generates a [Dynamic Cryptogram] using a combination of the [Payment Token], [Payment Token-Key], transaction amount, transaction counter etc. * Second, the [Secure Element] generates a [Dynamic CVV Value] using the [CVV-Key]. * Second, the [Secure Element] passes the [Payment Token] the [Dynamic Cryptogram], the [Dynamic CVV Value] and other payment and chip data elements to the terminal using the [EMVCo’s Contactless Suite of Specifications]. To put this in Apples terms, The Device Account Number or DAN represents the [Payment Token], the One-time Unique Number represents the [Dynamic Cryptogram] and the Dynamic Security Code represents the [Dynamic CVV Value]. The [Payment Network|Card Processor] identifies that it is a [Payment Token] and not a real [PAN] based on BIN tables. Consequently, they send a request out to the [TSP] to de-tokenize passing in the [Payment Token] and the [Dynamic Cryptogram]. The [TSP], among other things, validates the [Dynamic Cryptogram] using the [Payment Token-Key] that it shared earlier during the provisioning process. If the [Dynamic Cryptogram] is valid, the [TSP] de-tokenizes and returns the real [PAN] back to the [Payment Network|Card Processor]. The [Payment Network|Card Processor] attaches the real [PAN] to the authorization request and sends it over to the [Issuer Bank|Card Issuer] for authorization. The [Issuer Bank|Card Issuer] validates the [Dynamic CVV Value] based on the [CVV-Key] it shared earlier during the provisioning process. Then it authorizes the transaction depending on the customer’s account status. The authorization status flows back from the [Issuer Bank|Card Issuer] to the [Payment Network|Card Processor], back to the [Payment Card Acquirer|Acquirer] and back to the [Merchant] where your receipt gets printed. !! About the [{$pagename}] [Payment Token] The [Merchant] is sent the [Payment Token], which is a Virtual Credit Card Number, from the [Card-Emulation] process. With [{$pagename}] this will appear as a Credit Card Number issued from the bank that issued the Credit Card that is stored in [{$pagename}] that was selected to make the payment. You may see the last four digits of this [Payment Token] on the receipt of your purchase. If the cashier asks for the last four digits used in the transaction, (Generally, they should not), you should give the last four of your [Payment Token]. (TBD Where to find this value.) As far as we know this [Payment Token] will be the same every time you select the same Credit Card for payment within [{$pagename}]. !! Patent Filing The U.S. Patent and Trademark Office published Apple's application for a "[Method to send payment data through various air interfaces without compromising user data|http://appft.uspto.gov/netacgi/nph-Parser?Sect1=PTO2&Sect2=HITOFF&u=%2Fnetahtml%2FPTO%2Fsearch-adv.html&r=1&p=1&f=G&l=50&d=PG01&S1=(705%2F75.CCLS.+AND+20140116.PD.)&OS=ccl/705/75+and+pd/1/16/2014&RS=(CCL/705/75+AND+PD/20140116)|target='_blank']," which details a readily deployable digital system based on existing mobile hardware technology. Prior to today's filing, most of Apple's payment-minded patents have focused on use case scenarios, not backend infrastructure. Uses the term [Secure Element].[3] !! More Information There might be more information for this subject on one of the following: [{ReferringPagesPlugin before='*' after='\n' }] ---- * [#1] - [Apple Pay vs Google Wallet : The Secure Element|http://www.gmarwaha.com/blog/2014/10/02/apple-pay-vs-google-wallet-the-secure-element/|target='_blank'] - based on 2015-02-09 * [#2] - [How Apple Pay Really Works and Why You Should Begin Using it Immediately|http://www.kirklennon.com/a/applepay.html|target='_blank'] - based on 2015-02-09 * [#3] - [About Touch ID security on iPhone and iPad|http://support.apple.com/en-us/HT5949|target='_blank'] - based on information obtained 2015-02-21