Account Takeover Protection
Cybersource’s fraud protection solutions protect customers and merchants throughout the payments process. Here’s a step-by-step guide.
Anna’s quest for the perfect shoes has led her to FredsShoes.com, where she spots the ideal pair.
She immediately sets up an account on the website.
Over at FredsShoes.com, Fred can see he’s got a new customer. He’s cautious about payment fraud, but he knows Cybersource solutions can cover it.
Account Takeover Protection runs automatically to check Anna is the real deal.
It can check Anna’s ID in a number of ways, including confirming her IP address and email and by recognizing her device. It can also check for bots and look at the frequency of transactions. Just in case there’s anything suspicious.
Having set up her account, Anna enters her credit card details to pay for her shoes.
She’s one step nearer to shoe nirvana.
Our Token Management Service turns Anna’s personal and card data into a secure token, helping to protect both Fred and Anna from data theft.
Once a token is created, her credentials are securely retained. So, it’s easier for Anna to return to the store and buy again.
After all, you can never have too many shoes.
Fred can also use Payer Authentication as an extra layer of protection, especially as Anna’s a new customer. This determines whether additional customer verification is needed.
Using a process known as 3-D Secure authentication Anna’s identity can be cross-referenced. This could be done in various ways, including a one-time password or via biometric recognition.
Fred decides to run Payer Authentication, so Anna receives a six-digit code in a text message. She has to enter the code at the store checkout.
Anna’s never been more excited to receive a bunch of random numbers.
Fred sends out the shoes.
The process is so smooth he has time for an extra cappuccino.
Anna’s shoe collection is now complete.
Or is it…?