Point-to-point encryption (P2PE)
When selecting mPOS card readers, merchants should avoid any reader
that only converts the magnetic-stripe data on the customer’s card into an
audio signal that is transmitted in unencrypted form via the merchant’s smartphone.
That is a bad security practice, as there could be malware on the
smartphone that will intercept the card data.
The PCI SSC mPOS guidelines (see Chapter 4, mPOS devices, page 18)
state that the best option for merchants using mPOS is to use a PCI-validated
and approved point-to-point encryption (PCI P2PE) solution.
The PCI SSC’s PCI P2PE standard provides a specification for the use
of strong encryption to achieve point-to-point encryption, where clear-text
card data is removed from the payments environment. This is achieved by
encrypting data from the point of interaction (where cards are swiped or
dipped) until the data reaches the P2PE solution provider’s secure decryption
environment.
With P2PE, the card number is encrypted in the card reader with a key that
isn’t known to the merchant, and the card number can be decrypted only by
the processor or the issuer. By using a PCI-compliant P2PE solution, merchants
potentially can reduce their PCI compliance obligations.
Benoit Boudier, vice president of international sales at Ingenico Mobile Solutions,
says the apps on Ingenico’s mPOS devices cannot access sensitive
customer card data.
“We encrypt the card data at the point of acceptance both for Bluetooth-connected
PIN pads and for card readers connecting via a smartphone’s audio
jack,” he said. “The encrypted data is then sent to the acquirer.”