Monday, March 27, 2017

P2Pe Description and Protection

A P2P solution for a business is a way encryption through algorithmic calculations to secure payment card information including everything given by the simple swipe of a credit card.

With this type of encryption, businesses provide P2Pe solutions that follow a type of standard that must hold in order for a business to correctly use P2P to transfer their customers payment card information. This type of solution must include certified devices, processes and services that may be offered by a third party consultant or organization.

An example of a way of standards or certifications is the PCI standards, also known as the PCI Security Standards council (https://www.pcisecuritystandards.org/). PCI standards must follow the following standards:
  • Secure encryption of payment card data at the point-of-interaction (POI) 
  • P2PE-validated application(s) at the point-of-interaction 
  • Secure management of encryption and decryption devices 
  • Management of the decryption environment and all decrypted account data 
  • Use of secure encryption methodologies and cryptographic key operations, including key generation, distribution, loading/injection, administration and usage. 

Any company wishing to help establish a P2P connection must go through the right processes and services to ensure their clients and/or customers have a certified/standard following P2P encryption for the businesses customers' payment card information.

Although these standards to exist, and are implemented across many businesses, these standards do not have to be established by a third party company such as PCI. Companies follow PCI's standards because these standard shows their customers that the business is securing their payment card information. With that being said, businesses gathering payment card information must have a P2P connection to ensure their customer's payment card information is secure from unwanted hackers. The standards of a P2P connections can be self-assessed on a business or needs a third party, depending different factors such as size of business, type of business, etc.

For more information, here is a video on P2P Encryption standards, and the link below is on how to secure your data stream with P2P Encryption:



Securing Your Data Stream with P2P Encryption

Thank you!

1 comment:

  1. This was interesting to learn more about. Do you think this is an effective form of security or is there a more secure version out there?

    ReplyDelete