Here's part 3 in my six-part series on the credit card industry. This
     part discusses how authorization and settlement work.  This is a long
     one.  It will help if you have read parts 1 and 2, since I had to leave
     out a lot of overlap to keep this from getting ridiculous.  Enjoy.


      THE ACCEPTER
      --- --------

     An important fact to note is that a card accepter does not have to get
     approval for any purchases using credit or charge cards.  Of course, a
     merchant is usually interested in actually getting money, and so must
     participate in some form of settlement process (see below).  Usually,
     the most acceptable (to a merchant) forms of settlement are tied (by
     the acquirer) to authorization processes.  However, a merchant could
     simply accept all cards without any validation, any eat any fraud that
     results.

     A merchant typically makes a business arrangement with a local bank or
     some other acquirer for authorization and settlement services.  The
     acquirer assigns a merchant identifier to that merchant, which will
     uniquely identify the location of the transaction.  (This facilitates
     compliance with federal regulations requiring that credit card bills
     identify where each purchase was made.)  The acquirer also establishes
     procedures for the merchant to follow.  The procedures will vary by
     type of the merchant business, geographic location, volume of transac-
     tions, and types of cards accepted.

     If the merchant follows the procedures given by the acquirer and a
     transaction is approved, the merchant is guaranteed payment whether the
     card in question is good or bad.  The purpose of authorization is to
     shift financial liability from the acceptor to the acquirer.

     There are two basic tools used - bulletins and online checks. Bulletins
     may be hardcopy, or may be downloaded into a local controller of some
     form.  Online checks could be done via a voice call, a standalone ter-
     minal, or software and/or hardware integrated into the cash register.

     A low-volume, high-ticket application (a jewelry store) would probably
     do all its authorizations with voice calls, or may have a stand-alone
     terminal.  A high-volume, low-ticket application (a fast-food chain)
     will probably do most of its authorizations locally against a bulletin
     downloaded into the cash register controller.  Applications in between
     typically merge the two - things below a certain amount (the "floor
     limit") are locally authorized after a lookup in the bulletin, while
     things over the floor limit are authorized online.

     Usually a lot of effort is taken to use the least expensive tools that
     are required by the expected risk of fraud.  Typically, communication
     costs for authorizations make up the biggest single item in the overall
     cost of providing credit cards.

     Large accepters are always a special case.  Airlines are usually di-
     rectly connected, host-to-host, to issuers and/or acquirers, and autho-
     rize everything online.  Likewise for many petroleum companies and
     large department stores.  Some large chains use different approaches at
     different locations, either as a result of franchising oddities or due
     to volume differences between locations.  A lot of experimentation is
     still going on as well - this is not a mature market.

     For voice authorizations, the merchant ID, PAN, expiration date, and
     purchase amount are required for an approval.  Some applications also
     require the name on the card, but this is not strictly necessary.  For
     data authorizations, the merchant ID, PAN, PIN (if collected), expira-
     tion date, and purchase amount are required.  Typically, the "discre-
     tionary data" from track 2 is sent as well, but this is not strictly
     necessary.  In applications that do not transmit the PIN with the au-
     thorization, it is the responsibility of the merchant to verify iden-
     tity.  Usually, this should be done by checking the signature on the
     card against the signature on the form.  Merchants don't often follow
     this procedure, and they take a risk in not doing so.

     In most applications, the amount of the purchase is known at the time
     of the authorization request.  For hotels, car rentals, and some petro-
     leum applications, an estimated amount is used for the authorization. 
     After the transaction is complete (e.g. after the gas is pumped or at
     check-out time), another transaction may be sent to advise of the ac-
     tual amount of the transaction.  More on this later.


      THE ACQUIRER
      --- --------

     The acquirer gathers authorization requests from accepters and returns
     approvals.  If the acquirer is an issuer as well, "on us" transactions
     will typically be turned around locally.  As before, the acquirer does
     not have to forward any requests on to the actual issuer.  However,
     acquirers are not willing to take the financial risks associated with
     generating local approvals.  Thus most transactions are sent on to the
     issuers (interchanged).  The purpose of interchange is to shift finan-
     cial liability from the acquirer to the issuer.  

     Typically, an acquirer connects to many issuers, and negotiates differ-
     ent business arrangements with each one of them.  But the acquirer gen-
     erally provides a uniform interface to the accepter.  Thus, the
     interchange rules are sometimes less stringent than those imposed on
     the accepter.  Also, most issuers will trust acquirers to with respon-
     sibilities they would never trust to accepters.  The acquirer can
     therefore perform some front-end screening on the transactions, and
     turn some of them around locally without going back to the issuer.

     The first screening by the acquirer would be a "sanity" test, for valid
     merchant ID, valid Luhn check on PAN, expiration date not past, amount
     field within reason for type of merchant, etc.  After that, a floor
     limit check will be done.  Issuers generally give acquirers higher
     floor limits than acquirers give accepters, and floor limits may vary
     by type of merchant.  Next, a "negative file" check would be done
     against a file of known bad cards.  (This is essentially the same as
     the bulletin.)  Then a "velocity file" check may be done.  A velocity
     file keeps track of card usage, and limits are often imposed on both
     number of uses and total amount charged within a given time period.
     Sometimes multiple time periods are used, and it can get fairly compli-
     cated.

     Transactions that pass all the checks, and are within the authority
     vested in the acquirer by the issuer, are approved by the acquirer.
     (Note that, under the business arrangement, financial liability still
     resides with the issuer.)  An "advice" transaction is sometimes sent to
     the issuer (perhaps at a later time), to tell the issuer that the
     transaction took place.

     Transactions that "fail" one or more checks are denied by the acquirer
     (if the cause was due to form, such as bad PAN) or sent to the issuer
     for further checking.  (Note that "failure" here can mean that it's be-
     yond the acquirer's authority, not necessarily that the card is bad.)
     Some systems nowadays will periodically take transactions that would
     otherwise be approved locally, and send them to the issuer anyway. This
     serves as a check on the screening software and as a countermeasure
     against fraudulent users who know the limits.

     Transactions that go to the issuer are routed according to the first
     six digits of the PAN, according to the ISO registry mentioned in an
     earlier section.  Actually, it's a bit more complicated than that,
     since there can be multiple layers of acquirers, and some issuers or
     acquirers will "stand in" for other issuers when there are hardware or
     communication failures, but the general principal is the same at each
     point.


      THE ISSUER
      --- ------

     An issuer receiving an interchanged transaction will often perform many
     of the same tests on it that the acquirer performs.  Some of the tests
     may be eliminated if the acquirer is trusted to do them correctly. This
     is the only point where a velocity file can actually detect all usage
     of a card.  This is also the only point where a "positive file" lookup
     against the actual account can be done, since only the issuer has the
     account relationship with the cardholder.  If a PIN is used in the
     transaction, only the issuer can provide true PIN verification -
     acquirers may be able to do only "PIN offset" checking, as described in
     a previous section.  This is one reason why PINs have not become
     popular on credit and charge cards.

     An account typically has a credit limit associated with it.  An ap-
     proved authorization request usually places a "hold" against the credit
     limit.  If the sum of outstanding holds plus the actual outstanding
     balance on the account, plus the amount of the current transaction, is
     greater than the credit limit, the transaction is (usually) denied. 
     Often in such a case the issuer will send back a "call me" response to
     the merchant.  The merchant will then call the issuer's number, and the
     operator may even want to talk to the cardholder.  The credit limit
     could be extended on the spot, or artificially high holds (from hotels
     or car rental companies) could be overlooked so that the transaction
     can be approved.

     The difference between the credit limit and the sum of holds and out-
     standing balance is often referred to as the "open to buy" amount. Once
     a hold is placed on an account, it is kept there until the actual the
     transaction in question is settled (see below), in which case the
     amount goes from a hold to a billed amount, with no impact on the open
     to buy amount, theoretically.  For authorizations of an estimated
     amount, the actual settled amount will be less than or equal to the ap-
     proved amount.  (If not, the settlement can be denied, and the merchant
     must initiate a new transaction to get the money.)  Theoretically, in
     such a case, the full hold is removed and the actual amount is added to
     the outstanding balance, resulting in a possible increase in the open
     to buy amount.

     In practice, older systems were not capable of matching settlements to
     authorizations, and holds were simply expired based on the time it
     would take most transactions to clear.  Newer systems are starting to
     get more sophisticated, and can do a reasonable job of matching autho-
     rizations for actual amounts with the settlements.  Some of them still
     don't match estimated amounts well, with varying effects.  In some
     cases, the difference between actual and estimated will remain as a
     hold for some period of time.  In other cases, both the authorization
     and the settlement will go against the account, reducing the open to
     buy by up to twice the actual amount, until the hold expires.  These
     problems are getting better as the software gets more sophisticated.

     Some issuers are also starting to use much more sophisticated usage
     checks as well.  They will not only detect number of uses and amount
     over time, but also types of merchandise bought, or other patterns to
     buying behavior.  Most of this stuff is new, and is used for fraud pre-
     vention.  I expect this to be the biggest effort in authorization soft-
     ware for the next few years.

     American Express does things completely differently.  There are no
     credit limits on AMEX cards.  Instead, AMEX relies entirely on usage
     patterns, payment history, and financial data about cardmembers to de-
     termine whether or not to automatically approve a transaction.  AMEX
     also has a policy that a cardmember will never be denied by a machine.
     Thus, if the computer determines that a transaction is too risky, the
     merchant will receive a "call me" message.  The operator will then get
     details of the transaction from the merchant, and may talk to the
     cardmember as well, if cardmember identity is in question or a large
     amount is requested.  To verify cardmember identity, the cardmember
     will be asked about personal information from the original application,
     or about recent usage history.  The questions are not the same each
     time.  If an unusually large amount is requested, the cardmember may be
     asked for additional financial data, particularly anything relating to
     a change in financial status (like a new job or a promotion).  People
     who are paranoid about Big Brother and computer databases should not
     use AMEX cards.


      SETTLEMENT
      ----------

     So far, no money has changed hands, only financial liability.  The pur-
     pose of settlement is to shift the financial liability back to the
     cardholder, and to shift the cardholder's money to the merchant.
     Theoretically, all authorization information can be simply discarded
     once an approval is received by a merchant.  Of course, contested
     charges, chargebacks, merchant credits, and proper processing of holds
     require that the information stay around.  Still, it is important to
     realize that an authorization transaction has no direct financial con-
     sequences.  It only establishes who is responsible for the financial
     consequences to follow.

     Traditionally, a merchant would take the charge slips to the bank that
     was that merchant's acquirer, and "deposit" them into the merchant ac-
     count.  The acquirer would take the slips, sort them by issuer, and
     send them to the issuing banks, receiving credits by wire once they ar-
     rived and were processed.  The issuer would receive the slips, micro-
     film them (to save the transaction information, as required by federal
     and state laws) charge them against the cardholder's accounts, send
     credits by wire to the acquirer, and send out the bill to the
     cardholder.  Problem is, this took time.  Merchants generally had to
     wait a couple of weeks for the money to be available in their accounts,
     and issuers often suffered from float on the billables of about 45
     days.

     Therefore, nowadays many issuers and acquirers are moving to on-line
     settlement of transactions.  This is often called "draft capture" in
     the industry.  There are two ways this is done - one based on the host
     and one based on the terminal at the merchant's premises.  In the
     host-based case, the terminal generally only keeps counts and totals,
     while the acquirer host keeps all the transaction details. Peri-
     odically, the acquirer host and the terminal communicate, and verify
     that they both agree on the data.  In the terminal-based case, the ter-
     minal remembers all the important transaction information, and peri-
     odically calls the acquirer host and replays it all for several
     transactions.  In either case, once the settlement is complete the mer-
     chant account is credited.  The acquirer then sends the settlement in-
     formation electronically to the issuers, and is credited by wire
     immediately (or nearly so).  The issuer can bill directly to the
     cardholder account, and float can be reduced to an average of 15 days.

     The problem is, what to do with the paper?  Current regulations in many
     states require that it be saved, but there is no need for it to be sent
     to the issuer.  Also, for contested charges, a paper trail is much more
     likely to stand up in court, and much better to use for fraud investi-
     gations.  Currently, the paper usually ends up back at the issuer, as
     before, but it doesn't need to be processed, just microfilmed and
     stored.

     Much of the market still uses paper settlement methods.  Online settle-
     ment will replace virtually all of this within the next 5 to 10 years,
     because of its many benefits.

     This was pretty long, but there is a lot of information, and I skimmed
     over a lot of details.  Future installments should be shorter.  Coming
     up next is a discussion of fraud and security, and then a special dis-
     cussion of debit cards.  Hang on, we're halfway through this!


                     Joe Ziegler
                     att!lznv!ziegler