PCI P2P Encryption with Bluefin

Services:

nAuthorization

nStand-alone credit

Processors:

This feature is supported for all processors that are supported for card-present transactions. See Supported Processors.Device:

nID TECH SREDKey PCI Key Pad with Encrypted MagStripe Reader

 

You must use a device that meets the following requirements:

nIs provided by Bluefin Payment Systems unless otherwise agreed to by Cybersource and Bluefin

nIs injected with encryption keys for the Cybersource payment card industry (PCI) point-to-point encryption (P2PE) solution, which is powered by Bluefin

You need to have separate devices for sandbox testing and production.

Requirements

You must have a contractual relationship with Bluefin Payment Systems for PCI-validated P2PE services, which include:

nKey injection

nDecryption, which is performed by Cybersource

nHardware

You must manage your Bluefin devices through the Bluefin P2PE Manager portal, which enables you to:

nTrack device shipments

nDeploy or terminate devices

nManage users and administrators

nView P2PE transactions

nDownload and export reports for PCI compliance

 

Do not use terminal configuration #3 or #5, which causes the device to prompt you for the cardholder’s street address. To include the cardholder’s street address in your order management system, include the API field for the billing street address in your request.

Overview

The PCI P2PE solution, which is powered by Bluefin, does the following:

nSafeguards card data at the terminal hardware level

nReduces your PCI burden by minimizing the number of PCI audit questions to which you must respond

nProvides device life cycle management through the Bluefin P2PE Manager portal

nSupports magnetic stripe read (MSR) and manual key entry

The following diagram illustrates the steps in a transaction that uses encryption:

encryption_flow.png

 

1When a customer swipes a card through the Bluefin device, the device encrypts the card details at the hardware level and in accordance with PCI P2PE standards. The device sends the encrypted payload to your order management system.

2Your order management system sends the encrypted payload to Cybersource in an authorization request or stand-alone credit request.

3Cybersource sends the encrypted payload to Bluefin to be decrypted and parsed. Bluefin sends the decrypted data to Cybersource over a secure channel.

4Cybersource sends the decrypted data and additional transaction information to your processor.

Creating a Request for an Authorization or Stand-Alone Credit That Uses Bluefin PCI P2PE

 

When using the Simple Order API in XML format, you must use version 1.132 or later of the XML schema to use Bluefin P2PE encryption.

For examples that use Bluefin PCI P2PE, see:

nName-value pair examples: Authorization Using Bluefin PCI P2PE

nXML examples: Authorization Using Bluefin PCI P2PE

Step 1Include the following fields in the request:

nencryptedPayment_data

nencryptedPayment_descriptor

These fields are described in P2PE Request Fields.

Step 2Include general card-present request fields in the request as needed. See General Card-Present Request Fields.

Step 3Follow instructions in Credit Card Services Using the Simple Order API for creating an authorization request or stand-alone credit request.

 

Most of the fields that are normally required for an authorization request or stand-alone credit request are not required for a Bluefin PCI P2PE request because the encrypted data includes most of the required data.