Alliance Activities : Publications : Contactless Smart Cards

Publications – Contactless Smart Cards

The Smart Card Alliance developed this white paper to describe chip-enabled mobile marketing and discuss the value propositions and implementation approaches. The white paper includes an overview of mobile marketing applications and approaches, the value proposition of chip-enabled mobile marketing, use cases for chip-enabled mobile marketing (with 20 pilots or commercial services profiled), and implementation approaches.

The Smart Card Alliance Payments Council developed this white paper to describe the value propositions of contactless EMV payments for issuers and merchants. The white paper provides a fresh look at contactless payments in the current U.S. payments environment that is embracing both EMV and NFC-enabled mobile devices.

This white paper was developed by the Secure Technology Alliance Payments Council to discuss the challenges of issuing, accepting and processing ISO/IEC 14443/NFC contactless transactions and to help the market work through pre-EMV and post-EMV challenges to promote contactless issuance and acceptance.

The Smart Card Alliance Payments Council developed two infographics to summarize the benefits of contactless EMV payments for issuers and merchants.

This document was developed to address questions raised by the media about the security of contactless payment transactions and the risk of fraud to consumers.

The new electronic passports (ePassports) include digital and physical security technologies that are integrated together to provide significantly higher levels of security. ePassports use advanced technologies that secure identities and new processes throughout the entire chain of trust – from manufacturing to use of the ePassport. This frequently asked questions (FAQ) document was developed by the Smart Card Alliance Identity Council to answer questions about how the ePassport works and what technology is used to protect an ePassport holder’s personal information.

This U.S. Payments Forum white paper provides guidelines and best practices for accepting contactless transactions completed with Near Field Communication (NFC)-enabled mobile wallets and contactless-enabled chip cards at the ATM.

State policy makers are looking carefully at the use of RFID technology in identity cards and the implications that holds for protecting privacy and personal information in identity applications and systems. This brief was developed by the Smart Card Alliance Identity Council to examine best practices for privacy-secure identity systems from the point of view of card technologies.

This Smart Card Alliance white paper compares RFID technology and RF-enabled smart cards and describes key requirements in RF-enabled applications.

This white paper was developed to provide an overview of the ecosystem of proximity mobile payments. It introduces the stakeholders in the mobile payment ecosystem and describes their roles and responsibilities in assuring the security of sensitive data. It explains how the payment application, consumer credentials and consumer account information are securely delivered to, loaded on and stored in a mobile device. It explains how a mobile device transmits data to a merchant at the point of sale, identifies risks present during the lifecycle of the payment device, and suggests countermeasures. It also identifies industry standards and certifications organization organizations that address this ecosystem.

The Smart Card Alliance Transportation Council developed this white paper to provide the transit and financial industries with an educational overview of the various methods available for providing and re-loading fare media to individuals who do not have credit or debit cards, nor checking or savings accounts, and generally lack relationships with traditional banking institutions.

This white paper was developed by the Smart Card Alliance Payments Council Security Work Group to provide an overview of the security features available with contactless and contact smart cards and describe how the security features might apply or be important to different applications.