EMVCo Software Based Mobile Payment Security Requirements - V1.0 - 20161213 - 20161213093622436
EMVCo Software Based Mobile Payment Security Requirements - V1.0 - 20161213 - 20161213093622436
Mobile Payment
Version 1.0
December 2016
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 2 / 42
Legal Notice
The EMV® Specifications are provided “AS IS” without warranties of any kind, and EMVCo
neither assumes nor accepts any liability for any errors or omissions contained in these
Specifications. EMVCO DISCLAIMS ALL REPRESENTATIONS AND WARRANTIES,
EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-
INFRINGEMENT, AS TO THESE SPECIFICATIONS.
Without limiting the foregoing, the Specifications may provide for the use of public key
encryption and other technology, which may be the subject matter of patents in several
countries. Any party seeking to implement these Specifications is solely responsible for
determining whether its activities require a license to any such technology, including for
patents on public key encryption technology. EMVCo shall not be liable under any theory for
any party’s infringement of any intellectual property rights in connection with the EMV
Specifications.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 3 / 42
Version History
Version Date Description
V1.0 December 2016 First publication.
This document provides security guidance and
defines generic security requirements for
applications and interfaces involved in payment
transactions that do not involve a Secure Element.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 4 / 42
Contents
Version History ................................................................................................................... 3
1 Introduction ................................................................................................................... 7
1.1 Objective ................................................................................................................ 7
1.2 Target Audience ..................................................................................................... 8
1.3 Scope ..................................................................................................................... 8
1.4 Abbreviations.......................................................................................................... 8
1.5 Terminology.......................................................................................................... 10
1.6 Related Documentation ........................................................................................ 14
2 Software-based Mobile Payments .............................................................................. 15
2.1 Mobile Application ................................................................................................ 15
2.1.1 Software Development Kit ......................................................................... 15
2.1.2 Software Library ........................................................................................ 16
2.2 Credential Manager .............................................................................................. 16
2.3 Credential Storage................................................................................................ 16
2.4 Consumer Device Platform ................................................................................... 18
2.4.1 Basic Platform ........................................................................................... 18
2.4.2 Enhanced Platform ................................................................................... 19
2.5 System Overview ................................................................................................. 20
3 Mobile Application Life Cycle and Best Practices .................................................... 21
3.1 Application Design and Development ................................................................... 22
3.1.1 Secure Communication Channels ............................................................. 22
3.1.2 Platform Security....................................................................................... 23
3.1.3 Device Attestation ..................................................................................... 23
3.2 Mobile Application Download and Installation ....................................................... 24
3.3 User Enrolment .................................................................................................... 24
3.4 Provisioning and Credential Issuance ................................................................... 24
3.5 Card Credential Replenishment ............................................................................ 25
3.6 Monitoring and Reporting Information ................................................................... 25
3.7 Mobile Application Security and Management ...................................................... 26
3.7.1 Application and Platform Update Mechanism ............................................ 26
3.8 Application Removal ............................................................................................. 26
4 Mobile Application Security Architecture .................................................................. 27
4.1 Architecture of the Mobile Application ................................................................... 27
4.1.1 Types of Mobile Application Components ................................................. 27
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 5 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 6 / 42
Tables
Table 1.1: Abbreviations ...................................................................................................... 8
Table 1.2: Definitions ......................................................................................................... 10
Table 1.3: Related Documentation ..................................................................................... 14
Table 4.1: Attacks on the Mobile Application ...................................................................... 31
Table 4.2: Mobile Application Assets.................................................................................. 35
Figures
Figure 2.1: Provisioning of Software Card Credentials ....................................................... 17
Figure 2.2: Basic Mobile Payment System Overview (Example) ........................................ 18
Figure 2.3: Enhanced Mobile Payment System Overview (Example) ................................. 19
Figure 3.1: Mobile Application Life Cycle Model ................................................................. 21
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 7 / 42
1 Introduction
The payment industry has concentrated its efforts for several years on leveraging the existing
chip-based ecosystem and processes, where security models are well known and defined.
With the deployment of mobile consumer devices and the opportunity for easier deployments,
the payment industry is interested in a trust model that does not rely on the use of a Secure
Element (SE) to store and process payment transactions. This new model comes with its
challenges and requires, in particular, specific attention to the security aspect of such designs
and implementations.
There are many different available architectures to implement software-based payment
applications. Such applications can be installed, for example, in a Rich Execution Environment
(REE) or in a Trusted Execution Environment (TEE). The architecture choice has an impact
on the final security level of the payment product.
This document aims to establish a common security understanding around using a Consumer
Device (such as a mobile phone) for payment without involvement of a Secure Element (SE).
Note that an SE could still be used for other purposes.
This document does not focus on any specific type of payment; rather it:
Provides an overview of the system architecture, both for the issuance of Software
Cards and for payment transactions using Software Cards. It also defines the various
roles involved in issuance of, and transactions with, Software Cards.
Describes various models of management for the Mobile Application and for the
Software Cards and the Mobile Application life cycle.
An architecture reference model, including terminology and a list of roles involved in such
payment transactions, is described in a separate EMVCo document [Architecture].
1.1 Objective
This document provides security guidance and defines generic security requirements for
applications and interfaces involved in payment transactions that do not involve a Secure
Element.
Functional requirements are out of scope.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 8 / 42
1.3 Scope
The scope of this document is the mobile application as it could be downloaded, installed,
provisioned, and used on any type of device and for any software-based payment services
(e.g. proximity payment and remote payment).
The concepts explained in this document apply for all types of Operating Systems (OS), as
well as all known Consumer Device architectures (including the use of multiple devices such
as wearables connected to a mobile phone). It includes also platforms where TEE, TPM,
and/or SE are available for hardware support.
This document does not address MPOS and 3DS security requirements; however the majority
of the security requirements might equally apply. While the final wording of the security
requirements might differ, the intent and control objectives will be addressed in future versions.
1.4 Abbreviations
The following abbreviations are used in this document.
Abbreviation Description
API Application Programming Interface
C Confidentiality
GP GlobalPlatform
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 9 / 42
Abbreviation Description
HCE Host Card Emulation
I Integrity
OTA Over-The-Air
SE Secure Element
TA Trusted Application
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 10 / 42
1.5 Terminology
The following terms are used in this document:
Term Description
Acquirer An entity that has a commercial relationship with the Merchant and
with the Payment System and processes payment transactions on
behalf of the Merchant.
Basic Platform A Consumer Device platform that does not provide verifiable
hardware security for protection of the Software Card security
assets.
Card A card is used here as a generic term for the payment application
linked to an account by virtue of its PAN or Token.
Code lifting Transferring executable code to another system while retaining the
functionality without the need to fully reverse engineer it.
Consumer Device The device, typically a mobile phone or a tablet, which hosts the
Mobile Application used for payment by the consumer.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 11 / 42
Term Description
Credential Manager The entity that manages the credentials to be provisioned to the
Software Card(s) used by the Mobile Application. The Credential
Manager has the capability to establish a secure communication
with the Mobile Application for the provisioning and management of
Software Cards.
Credential Provider The entity that generates the credentials for the Software Card.
Device Binding Using device information or hardware features such that it is hard or
impossible to operate software on a different device or platform on
a different device or platform.
Information Binding Using unique device information such that it is hard to operate the
software elsewhere without obtaining this information from the
device.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 12 / 42
Term Description
Mobile Application The application that hosts Software Cards on board the Consumer
Device. The Mobile Application may be downloaded from an
application store or may come pre-loaded in the Consumer Device.
In its most complex form, it may store several Software Cards from
various Issuers and Payment Systems, and enables the Consumer
to manage them and transact with them. For example, a Payment
Card Manager as described in [Payment Card Management]
Mobile Application The entity responsible for installing and managing the Mobile
Provider Application on the Consumer Device.
Obfuscation Hiding information about program state, execution flow, and data
streams to make it hard to understand the meaning and
functionality. Includes obfuscation of:
Data
Key
Code / program
Payment System An entity that has a commercial relationship with the Issuer and
with the Acquirer. The Payment System specifies Software Cards
and Mobile Application(s). It may provide a Software Development
Kit (SDK) that can be integrated into a Mobile Application to
facilitate the deployment of Software Cards.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 13 / 42
Term Description
The card credentials used for Software-based Mobile Payments
Software Card
stored inside the Mobile Application. For example, a contactless
Payment Application as described in [Payment Card Management]
Token Service An entity that provides a Token Service comprised of the Token
Provider Vault and related processing.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 14 / 42
Reference Document
[HCE Position] EMVCo – Position paper on the Impact of Host Card Emulation
(HCE) on Contactless Mobile Payments
[GP TEE WP] GlobalPlatform – TEE White Paper: The Trusted Execution
Environment: Delivering Enhanced Security at a Lower Cost to
the Mobile Market
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 15 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 16 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 17 / 42
Credential
Manager
Secure
communication
MyBank C
MyBank B
Mobile MyBank A1234 5678 9012
Software 3456
1234 5678 9012 3456 12/17
LEE M. CARDHOLDER
Application Cards
1234 5678 9012 3456 12/17
LEE M. CARDHOLDER
12/17
LEE M. CARDHOLDER
Consumer Device
In Figure 2.1, the Credential Manager is the entity which provisions the Software Card
credentials to the mobile application. The Mobile Application is the entity which hosts the
Software Card. A secure connection must be provided to ensure that the software card
credentials are protected end-to-end regardless of the deployment model. See the Mobile
Payment architecture document [Architecture] for a more detailed description.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 18 / 42
App
App Store Download
Enrolment / Management
Payment Credential download
Interface
Issuance Authorization
Non-payment System System
functionality
Payment
Assets
App
N
Mandatory F Reader Acquirer
Operating System
C
Optional Consumer Device Platform
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 19 / 42
App
App Store Download
Enrolment / Management
Payment Credential download
Interface
Issuance Authorization
Non-payment System System
functionality
Payment
Assets
TA or TEE App
N
Mandatory F Reader Acquirer
Operating System
C
Optional Consumer Device Platform
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 20 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 21 / 42
App
Application Design and
Removal
Development
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 22 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 23 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 24 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 25 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 26 / 42
If ever a compromise is detected, one will need to ensure appropriate action is taken.
Depending on the severity of the compromise, this could include a range of measures – from
suspension of the payment capability and contacting the cardholder, through full deactivation
of the Mobile Application and the deletion of all Software Card credentials.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 27 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 28 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 29 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 30 / 42
4.2.4 Scenarios
Two scenarios are considered where an attacker tries to compromise Mobile Application
assets, or identify and exploit vulnerabilities:
The attacker gains remote access to the Consumer Device through manipulation of
one or more available logical interfaces.
In this scenario the security objective is to reduce the risk of scalable logical attacks
on the Mobile Application that achieve the attacker’s goal.
The attacker gains local access to the device through manipulation or eavesdropping
of available physical or logical interfaces, or by physical tampering.
Physical attacks are typically not scalable but if it is possible to use the Mobile
Application by straightforward physical means following the attack then any ‘lost and
stolen’ prevention mechanism – such as device lock and/or consumer authentication
requirements for payment – are no longer effective.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 31 / 42
4.2.6 Attacks
To compromise the inherent security of the Mobile Application, an attacker is likely to attempt
one of the attacks listed below.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 32 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 33 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 34 / 42
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 35 / 42
2 Assets and sensitive information C/I+ These include private and secret
cryptographic keys and related
cryptographic keys and related
parameters used for remote management
parameters (static and
and personalisation of the Mobile
dynamic)
Application.
used for communications
Public keys do not require confidentiality,
processing and to secure
nor do the parameters used for validation
transport to the Mobile
of pinned certificates.
Application
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 36 / 42
No. Requirement
1.1 The Mobile Application must have a user (security) guidance document defining how to use
the Mobile Application in a secure manner.
1.2 The user guidance document must state how the Mobile Application can be securely installed
and updated including default settings.
1.3 The user guidance document must list all security assets. For each security asset it must state
the required protection (C/I/I+).
1.4 The user guidance document must indicate which devices – including platform versions (e.g.
OS, TEE, and TPM) – are supported.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 37 / 42
No. Requirement
2.1 All security assets in the Mobile Application must be protected (C/I/I+) commensurate with
their status (ephemeral, short-lived, or long-lived) as indicated in the security objectives for
the Mobile Application.
2.2 Confidential data must be securely removed from the device when no longer needed.
2.3 Sensitive data (both while stored and while in transit) must be protected as necessary for its
stated security requirements.
Each Mobile Application component that reads an asset from another Mobile Application
component must maintain the confidentiality (“C”) requirement specified for that asset.
The communications of the asset between the components must also maintain the
confidentiality (“C”) requirements specified for that asset.
2.4 Sensitive data used during processing (e.g. to compute a cryptogram) must be protected as
necessary for its stated security requirements.
Each Mobile Application component that will use an asset within its own processing or
provide it to another Mobile Application component must ensure that its I/I+ requirements
are maintained as specified for that asset.
The communications of the asset between the components must also maintain the I/I+
requirements specified for that asset.
2.5 The security mechanisms used by the Mobile Application to protect the assets must be
evaluated. If the mechanisms rely on the security of an underlying component (such as a TEE,
white-box crypto, and obfuscation) then the security of the underlying component must also
be evaluated and, where appropriate, certified.
2.6 If the assurance of the Mobile Application relies on security functionality provided by a
component, that component must provide demonstrable assurance for that functionality
based on how the component is integrated into the Consumer Device and not on an
evaluation of the isolated component.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 38 / 42
No. Requirement
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 39 / 42
No. Requirement
4.1 The Mobile Application must have a defined list of entities and interfaces it is allowed to
communicate with.
4.2 The Mobile Application must be able to securely authenticate each of the allowed entities
listed in MA_SEC-REQ-4.1.
4.3 The Mobile Application must be able to establish that the Credential Manager is authentic so
that it may trust the credentials given to it.
4.4 The Credential Manager must be able to authenticate the Mobile Application in order to be
certain that credentials are not given to an untrusted application.
4.5 A Mobile Application, or any of its components, must not disclose sensitive information when
queried by an unauthorized entity.
No. Requirement
5.1 The Mobile Application must provide or integrate with approved functionality to authenticate
the consumer (e.g. numeric passcode, pattern used for device unlock, fingerprint), whenever
applicable to a transaction.
5.2 The integration of CVM functionality with the Mobile Application must ensure integrity for the
result of CVM processing and ensure authenticity of cardholder intent / consent status that is
presented to the Mobile Application.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 40 / 42
No. Requirement
6.1 Account information and authentication data used for security reporting must be protected
from unauthorized disclosure and modification.
6.2 Any reporting communications, but in particular error codes, must not reveal information
that would aid an attacker in obtaining sensitive information.
6.3 If any compromises are detected, the Mobile Application must have the capability to report
to a server-side and the user / owner of the mobile device.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 41 / 42
No. Requirement
7.1 Industry standardized cryptographic algorithms (e.g. TDES, AES, RSA, ECC), methods, and
protocols must be used and securely configured.
7.2 Cryptographic keys must be protected (C/I/I+) as indicated in the security objectives for the
Mobile Application.
7.3 Cryptographic keys must be used only for their intended purpose.
7.4 The cryptographic key hierarchy must be defined, including the following for every key:
cryptographic key name
key size
key usage (e.g. encryption, decryption, MAC, key encryption)
key uniqueness (i.e. unique per Mobile Application or is being shared with other Mobile
Applications)
key lifetime (e.g. ephemeral, short-lived, long-lived)
key generation including location
key protection
key storage location
7.5 Random numbers (e.g. unpredictable numbers) must have sufficient entropy for the required
security level within the Mobile Application.
7.6 Data and cryptographic keys requiring encryption must be protected with cryptographic
keys bound to the Mobile Application and Consumer Device (i.e. must be device and
application bound).
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.
EMV Mobile Payment
Software-based Mobile Payment Security Requirements v1.0 Page 42 / 42
No. Requirement
8.1 The Mobile Application must be developed with proper configuration and source code
control.
8.2 The Mobile Application development site must be properly protected from a physical, logical,
and organizational security perspective.
8.3 The Mobile Application must be developed with secure design and security coding practices.
© 2016 EMVCo, LLC. All rights reserved. Reproduction, distribution and other use of this document is permitted
only pursuant to the applicable agreement between the user and EMVCo found at www.emvco.com. EMV® is a
registered trademark or trademark of EMVCo, LLC in the United States and other countries.