textfiles/anarchy/CARDING/cc101_3.txt

281 lines
16 KiB
Plaintext

Here's part 3 in my six-part series on the credit card industry. This
part discusses how authorization and settlement work. This is a long
one. It will help if you have read parts 1 and 2, since I had to leave
out a lot of overlap to keep this from getting ridiculous. Enjoy.
THE ACCEPTER
--- --------
An important fact to note is that a card accepter does not have to get
approval for any purchases using credit or charge cards. Of course, a
merchant is usually interested in actually getting money, and so must
participate in some form of settlement process (see below). Usually,
the most acceptable (to a merchant) forms of settlement are tied (by
the acquirer) to authorization processes. However, a merchant could
simply accept all cards without any validation, any eat any fraud that
results.
A merchant typically makes a business arrangement with a local bank or
some other acquirer for authorization and settlement services. The
acquirer assigns a merchant identifier to that merchant, which will
uniquely identify the location of the transaction. (This facilitates
compliance with federal regulations requiring that credit card bills
identify where each purchase was made.) The acquirer also establishes
procedures for the merchant to follow. The procedures will vary by
type of the merchant business, geographic location, volume of transac-
tions, and types of cards accepted.
If the merchant follows the procedures given by the acquirer and a
transaction is approved, the merchant is guaranteed payment whether the
card in question is good or bad. The purpose of authorization is to
shift financial liability from the acceptor to the acquirer.
There are two basic tools used - bulletins and online checks. Bulletins
may be hardcopy, or may be downloaded into a local controller of some
form. Online checks could be done via a voice call, a standalone ter-
minal, or software and/or hardware integrated into the cash register.
A low-volume, high-ticket application (a jewelry store) would probably
do all its authorizations with voice calls, or may have a stand-alone
terminal. A high-volume, low-ticket application (a fast-food chain)
will probably do most of its authorizations locally against a bulletin
downloaded into the cash register controller. Applications in between
typically merge the two - things below a certain amount (the "floor
limit") are locally authorized after a lookup in the bulletin, while
things over the floor limit are authorized online.
Usually a lot of effort is taken to use the least expensive tools that
are required by the expected risk of fraud. Typically, communication
costs for authorizations make up the biggest single item in the overall
cost of providing credit cards.
Large accepters are always a special case. Airlines are usually di-
rectly connected, host-to-host, to issuers and/or acquirers, and autho-
rize everything online. Likewise for many petroleum companies and
large department stores. Some large chains use different approaches at
different locations, either as a result of franchising oddities or due
to volume differences between locations. A lot of experimentation is
still going on as well - this is not a mature market.
For voice authorizations, the merchant ID, PAN, expiration date, and
purchase amount are required for an approval. Some applications also
require the name on the card, but this is not strictly necessary. For
data authorizations, the merchant ID, PAN, PIN (if collected), expira-
tion date, and purchase amount are required. Typically, the "discre-
tionary data" from track 2 is sent as well, but this is not strictly
necessary. In applications that do not transmit the PIN with the au-
thorization, it is the responsibility of the merchant to verify iden-
tity. Usually, this should be done by checking the signature on the
card against the signature on the form. Merchants don't often follow
this procedure, and they take a risk in not doing so.
In most applications, the amount of the purchase is known at the time
of the authorization request. For hotels, car rentals, and some petro-
leum applications, an estimated amount is used for the authorization.
After the transaction is complete (e.g. after the gas is pumped or at
check-out time), another transaction may be sent to advise of the ac-
tual amount of the transaction. More on this later.
THE ACQUIRER
--- --------
The acquirer gathers authorization requests from accepters and returns
approvals. If the acquirer is an issuer as well, "on us" transactions
will typically be turned around locally. As before, the acquirer does
not have to forward any requests on to the actual issuer. However,
acquirers are not willing to take the financial risks associated with
generating local approvals. Thus most transactions are sent on to the
issuers (interchanged). The purpose of interchange is to shift finan-
cial liability from the acquirer to the issuer.
Typically, an acquirer connects to many issuers, and negotiates differ-
ent business arrangements with each one of them. But the acquirer gen-
erally provides a uniform interface to the accepter. Thus, the
interchange rules are sometimes less stringent than those imposed on
the accepter. Also, most issuers will trust acquirers to with respon-
sibilities they would never trust to accepters. The acquirer can
therefore perform some front-end screening on the transactions, and
turn some of them around locally without going back to the issuer.
The first screening by the acquirer would be a "sanity" test, for valid
merchant ID, valid Luhn check on PAN, expiration date not past, amount
field within reason for type of merchant, etc. After that, a floor
limit check will be done. Issuers generally give acquirers higher
floor limits than acquirers give accepters, and floor limits may vary
by type of merchant. Next, a "negative file" check would be done
against a file of known bad cards. (This is essentially the same as
the bulletin.) Then a "velocity file" check may be done. A velocity
file keeps track of card usage, and limits are often imposed on both
number of uses and total amount charged within a given time period.
Sometimes multiple time periods are used, and it can get fairly compli-
cated.
Transactions that pass all the checks, and are within the authority
vested in the acquirer by the issuer, are approved by the acquirer.
(Note that, under the business arrangement, financial liability still
resides with the issuer.) An "advice" transaction is sometimes sent to
the issuer (perhaps at a later time), to tell the issuer that the
transaction took place.
Transactions that "fail" one or more checks are denied by the acquirer
(if the cause was due to form, such as bad PAN) or sent to the issuer
for further checking. (Note that "failure" here can mean that it's be-
yond the acquirer's authority, not necessarily that the card is bad.)
Some systems nowadays will periodically take transactions that would
otherwise be approved locally, and send them to the issuer anyway. This
serves as a check on the screening software and as a countermeasure
against fraudulent users who know the limits.
Transactions that go to the issuer are routed according to the first
six digits of the PAN, according to the ISO registry mentioned in an
earlier section. Actually, it's a bit more complicated than that,
since there can be multiple layers of acquirers, and some issuers or
acquirers will "stand in" for other issuers when there are hardware or
communication failures, but the general principal is the same at each
point.
THE ISSUER
--- ------
An issuer receiving an interchanged transaction will often perform many
of the same tests on it that the acquirer performs. Some of the tests
may be eliminated if the acquirer is trusted to do them correctly. This
is the only point where a velocity file can actually detect all usage
of a card. This is also the only point where a "positive file" lookup
against the actual account can be done, since only the issuer has the
account relationship with the cardholder. If a PIN is used in the
transaction, only the issuer can provide true PIN verification -
acquirers may be able to do only "PIN offset" checking, as described in
a previous section. This is one reason why PINs have not become
popular on credit and charge cards.
An account typically has a credit limit associated with it. An ap-
proved authorization request usually places a "hold" against the credit
limit. If the sum of outstanding holds plus the actual outstanding
balance on the account, plus the amount of the current transaction, is
greater than the credit limit, the transaction is (usually) denied.
Often in such a case the issuer will send back a "call me" response to
the merchant. The merchant will then call the issuer's number, and the
operator may even want to talk to the cardholder. The credit limit
could be extended on the spot, or artificially high holds (from hotels
or car rental companies) could be overlooked so that the transaction
can be approved.
The difference between the credit limit and the sum of holds and out-
standing balance is often referred to as the "open to buy" amount. Once
a hold is placed on an account, it is kept there until the actual the
transaction in question is settled (see below), in which case the
amount goes from a hold to a billed amount, with no impact on the open
to buy amount, theoretically. For authorizations of an estimated
amount, the actual settled amount will be less than or equal to the ap-
proved amount. (If not, the settlement can be denied, and the merchant
must initiate a new transaction to get the money.) Theoretically, in
such a case, the full hold is removed and the actual amount is added to
the outstanding balance, resulting in a possible increase in the open
to buy amount.
In practice, older systems were not capable of matching settlements to
authorizations, and holds were simply expired based on the time it
would take most transactions to clear. Newer systems are starting to
get more sophisticated, and can do a reasonable job of matching autho-
rizations for actual amounts with the settlements. Some of them still
don't match estimated amounts well, with varying effects. In some
cases, the difference between actual and estimated will remain as a
hold for some period of time. In other cases, both the authorization
and the settlement will go against the account, reducing the open to
buy by up to twice the actual amount, until the hold expires. These
problems are getting better as the software gets more sophisticated.
Some issuers are also starting to use much more sophisticated usage
checks as well. They will not only detect number of uses and amount
over time, but also types of merchandise bought, or other patterns to
buying behavior. Most of this stuff is new, and is used for fraud pre-
vention. I expect this to be the biggest effort in authorization soft-
ware for the next few years.
American Express does things completely differently. There are no
credit limits on AMEX cards. Instead, AMEX relies entirely on usage
patterns, payment history, and financial data about cardmembers to de-
termine whether or not to automatically approve a transaction. AMEX
also has a policy that a cardmember will never be denied by a machine.
Thus, if the computer determines that a transaction is too risky, the
merchant will receive a "call me" message. The operator will then get
details of the transaction from the merchant, and may talk to the
cardmember as well, if cardmember identity is in question or a large
amount is requested. To verify cardmember identity, the cardmember
will be asked about personal information from the original application,
or about recent usage history. The questions are not the same each
time. If an unusually large amount is requested, the cardmember may be
asked for additional financial data, particularly anything relating to
a change in financial status (like a new job or a promotion). People
who are paranoid about Big Brother and computer databases should not
use AMEX cards.
SETTLEMENT
----------
So far, no money has changed hands, only financial liability. The pur-
pose of settlement is to shift the financial liability back to the
cardholder, and to shift the cardholder's money to the merchant.
Theoretically, all authorization information can be simply discarded
once an approval is received by a merchant. Of course, contested
charges, chargebacks, merchant credits, and proper processing of holds
require that the information stay around. Still, it is important to
realize that an authorization transaction has no direct financial con-
sequences. It only establishes who is responsible for the financial
consequences to follow.
Traditionally, a merchant would take the charge slips to the bank that
was that merchant's acquirer, and "deposit" them into the merchant ac-
count. The acquirer would take the slips, sort them by issuer, and
send them to the issuing banks, receiving credits by wire once they ar-
rived and were processed. The issuer would receive the slips, micro-
film them (to save the transaction information, as required by federal
and state laws) charge them against the cardholder's accounts, send
credits by wire to the acquirer, and send out the bill to the
cardholder. Problem is, this took time. Merchants generally had to
wait a couple of weeks for the money to be available in their accounts,
and issuers often suffered from float on the billables of about 45
days.
Therefore, nowadays many issuers and acquirers are moving to on-line
settlement of transactions. This is often called "draft capture" in
the industry. There are two ways this is done - one based on the host
and one based on the terminal at the merchant's premises. In the
host-based case, the terminal generally only keeps counts and totals,
while the acquirer host keeps all the transaction details. Peri-
odically, the acquirer host and the terminal communicate, and verify
that they both agree on the data. In the terminal-based case, the ter-
minal remembers all the important transaction information, and peri-
odically calls the acquirer host and replays it all for several
transactions. In either case, once the settlement is complete the mer-
chant account is credited. The acquirer then sends the settlement in-
formation electronically to the issuers, and is credited by wire
immediately (or nearly so). The issuer can bill directly to the
cardholder account, and float can be reduced to an average of 15 days.
The problem is, what to do with the paper? Current regulations in many
states require that it be saved, but there is no need for it to be sent
to the issuer. Also, for contested charges, a paper trail is much more
likely to stand up in court, and much better to use for fraud investi-
gations. Currently, the paper usually ends up back at the issuer, as
before, but it doesn't need to be processed, just microfilmed and
stored.
Much of the market still uses paper settlement methods. Online settle-
ment will replace virtually all of this within the next 5 to 10 years,
because of its many benefits.
This was pretty long, but there is a lot of information, and I skimmed
over a lot of details. Future installments should be shorter. Coming
up next is a discussion of fraud and security, and then a special dis-
cussion of debit cards. Hang on, we're halfway through this!
Joe Ziegler
att!lznv!ziegler