Security

A new benchmark for secure payments

Eliminate the common causes of card fraud

Bluechain solutions are built on a new and innovative security architecture, allowing transactions to occur over any open channel. Features like preventing fraud, reducing costs, simplifying the user experience, billing intelligence, and interoperability are all made possible through the elegance of the security design.

Bluechain security ticks every box

  • Only Bluechain customers can authorise payments on their eCard.
  • The identities of both parties are verified.
  • Every eCard is associated with an owner-registered device.
  • The user’s account details are not stored on their phone.
  • The user’s bank account or bank-issued credit card details are never disclosed to the merchant.
  • Bank accounts and credit cards linked to an eCard must be owner-verified.
  • There is no possibility of unauthorised use of lost or stolen cards.
  • There is no possibility of man-in-the-middle or man-in-the-browser fraud.
  • Bluechain eCards cannot be faked.
  • Only Bluechain customers can authorise payments on their eCard.
  • The identities of both parties are verified.
  • Every eCard is associated with an owner-registered device.
  • The user’s account details are not stored on their phone.
  • The user’s bank account or bank-issued credit card details are never disclosed to the merchant.
  • Bank accounts and credit cards linked to an eCard must be owner-verified.
  • There is no possibility of unauthorised use of lost or stolen cards.
  • There is no possibility of man-in-the-middle or man-in-the-browser fraud.
  • Bluechain eCards cannot be faked.

Bluechain secures every transaction

Bluechain security is applied to every card-present and card-not-present transaction: in-store, online, billing, pay anyone, or over the phone. And when a credit card is attached to a Bluechain eCard, Bluechain does what Visa and MasterCard can’t and secures the card details, even when paying online.

Every transaction has a unique signature

Bluechain securely binds the validated identities of both parties to the transaction details and the account-holder’s authorisation. And each eCard is associated with an owner-registered device. So every authorised transaction has a unique signature which cannot be reused or faked.

Every transaction must be approved by the account holder

Funds cannot be debited from the user’s account without the knowledge and approval of the user. If the user’s mobile device is lost or stolen, the Bluechain app is fully protected to prevent unauthorised use. And at no stage during or after a transaction are the user’s account details disclosed to the merchant, another Bluechain user or any other party involved in the transaction.

Safe over any open channel

The request/acceptance transaction can go “in the clear”, that is, it can be sent over an unsecured communication channel, whether it is Bluetooth, Wi-Fi, internet, or even in an email attachment. The transaction can be read by anyone, so that it can be directed to the Bluechain payment server of the payer. Reading the contents of the transaction does not provide the reader with any useful data that could enable them to repeat, recreate, alter or reuse in any way that transaction. In other words, the privacy of the transaction does impact the security.