Re: [Web Crypto Next] Status and next steps

To add one more point ... the work that we hope to accomplish as a follow up to the recent W3C workshop on hardware tokens, that would allow seemess integration of secure elements (with non-user managed IDs) to the browsers will enable Apple Pay type convenient and secure ecommerce to the web.

So let's figure out how!

-Siva 

On October 14, 2014, at 11:16AM, Siva Narendra wrote:

Hadi is right. Officially it is expected that visa/mc will put a ecommerce pricing table together that uses tokenization (like Apple Pay) that has has lower rates than traditional CNP ecommerce. Will it approach CP rates depends on ID Validation and Assurance used. 

Apple Pay tokens have NIST Level 4 ID Assurance because of the use of hardware secure element. I think iPhone 6 has a SmartMX smart card controller. So CP rates is quite likely for Apple Pay based ecommerce. 

-Siva 

On October 14, 2014, at 10:19AM, Hadi Nahari wrote:

Rumor has it that Apple Pay might be getting CP (Card Present) rates for
remote purchases made using iPhone 6/+.

Regards,
-Hadi
\----------------------------------------------
Hadi Nahari, Chief Security Architect,  NVIDIA
M:+1.650.605.3564  O:+1.408.562.7916
----------------------------------------------\
Dubito ergo mihi licet esse





On 10/11/14, 10:42 PM, "Anders Rundgren" <anders.rundgren.net@gmail.com>
wrote:

>Hi Virginie,
>
>During the 20Y+ we have bought stuff on the web and paid with credit
>cards,
>the method haven't changed.  That is, in spite of a billion s.c. EMV-cards
>in circulation, on the web we are currently stuck with highly inconvenient
>and (any number of times proved) unsecure CNP (Card Not Present) schemes..
>
>To me it looks like a task for your particular sector coming up with a
>proposal on how to address this pretty obvious use case.
>
>Apple have advanced the state of on-line payments by a mile in iPhone 6,
>but AFAIK it doesn't include the web.
>
>Sincerely,
>Anders Rundgren
>
>On 2014-10-10 14:57, GALINDO Virginie wrote:
>> Dear all,
>>
>> A short status of where we are in the Web Crypto Next Workshop follow
>>up.
>>
>> -As announced [1], a wiki has been set up to receive your ideas about
>>the re-chartering of Web Crypto WG, taking into account the findings of
>>the Web Crypto Next Workshop.
>>
>> -The workshop report will soon made available by Harry Halpin probably
>>next week, it will be circulated on this mailing list for review during
>>one week.
>>
>> -During  W3C TPAC meeting scheduled on 26-31 Oct [2] , there will be
>>some actions to socialize the workshop findings with W3C members (during
>>security related WG, during the AC representatives meeting, and during
>>Wednesday Break-Out sessions)
>>
>> -Still during the TPAC week, Wendy, W3C security domain leader has
>>organized a conversation with Web App Sec and Web Crypto chairs to see
>>how we could re-charter both groups in synchronization, taking into
>>account workshop findings.
>>
>> If you need some help to contribute, give your opinion, better
>>understand direction, do not hesitate to ask question to Wendy, Harry,
>>or myself !
>>
>> Regards,
>>
>> Virginie Galindo
>>
>> gemalto
>>
>> signing as chair of web crypto / chair of web security ig
>>
>> [1] 
>>http://lists.w3.org/Archives/Public/public-web-security/2014Oct/0001.html

>>
>> [2] http://www.w3.org/2014/11/TPAC/

>>
>> 
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-------------------------------------------------------------------------
>>-----------------------------------------
>> This message and any attachments are intended solely for the addressees
>>and may contain confidential information. Any unauthorized use or
>>disclosure, either whole or partial, is prohibited.
>> E-mails are susceptible to alteration. Our company shall not be liable
>>for the message if altered, changed or falsified. If you are not the
>>intended recipient of this message, please delete it and notify the
>>sender.
>> Although all reasonable efforts have been made to keep this
>>transmission free from viruses, the sender will not be liable for
>>damages caused by a transmitted virus.
>
>

-----------------------------------------------------------------------------------
This email message is for the sole use of the intended recipient(s) and may contain
confidential information.  Any unauthorized review, use, disclosure or distribution
is prohibited.  If you are not the intended recipient, please contact the sender by
reply email and destroy all copies of the original message.
-----------------------------------------------------------------------------------

Received on Tuesday, 14 October 2014 18:29:46 UTC