Payment Tokenization Explained (2024)

Table of contents

What is tokenization?Credit card tokenization historyTokenization vs. encryptionTokenization examplesFAQs about tokenization

“Tokenization” is a super-buzzy payments word at the moment, especially because of the increased attention on mobile payments apps like Apple Pay. Basically, tokenization adds an extra level of security to sensitive credit card data.

What is tokenization?

Tokenization is the process of protecting sensitive data by replacing it with an algorithmically generated number called a token. Often times tokenization is used to prevent credit card fraud. In credit card tokenization, the customer’s primary account number (PAN) is replaced with a series of randomly-generated numbers, which is called the “token.” These tokens can then been passed through the internet or the various wireless networks needed to process the payment without actual bank details being exposed. The actual bank account number is held safe in a secure token vault.

Payment Tokenization Explained (1)

Just like the nationwide shift to chip cards, tokenization’s end game is to prevent the bad guys from duplicating your bank information onto another card. But while chip cards protect against fraud that occurs when someone pays at a physical store, tokenization is primarily designed to fight online or digital breaches.

Bring together your checking, savings, and loans

Learn more -/^

Credit card tokenization history

Substitution techniques like tokenization have been in practice for decades as a way to isolate data in ecosystems like databases. Historically encryption with reversible cryptographic ‘keys’ was the preferred method of protecting sensitive data. According to Stanford University’s encryption expert, “Encryption is the transformation of data into a form unreadable by anyone without a secret decryption key. Its purpose is to ensure privacy by keeping the information hidden from anyone for whom it is not intended, even those who can see the encrypted data. For example, one may wish to encrypt files on a hard disk to prevent an intruder from reading them.” Encryption has a wide variety of use cases, from cloaking private messages in P2P apps to transferring sensitive information in a vulnerable environment.

But more recently, payment experts are seeing more and more organizations moving from encryption to tokenization as a more cost-effective (and secure) way to protect and safeguard sensitive information.

One of the most widespread uses of tokenization today is in the payments processing industry. Tokenization allows users to store credit card information in mobile wallets, ecommerce solutions and POS software to allow the card to be recharged without exposing the original card information.

Tokenization vs. encryption

CriteriaTokenizationEncryption
PAN data displayedX
Mathematically reversibleX
Reduces PCI scopeX
Payment flexibility: refunds, chargebacks, recurring payments etc.x
Rotation of keys requiredX
End-to-end securityX
Low-cost per transactionX
Format fits with legacy credit card fieldsX
Centrally managedX
Established securityX

Tokenization replaces sensitive cardholder detail with a stand-in token. This helps secure the customer’s bank account details in credit card and eCommerce transactions.

End to end encryption (aka “data field encryption”) on the other hand, encrypts cardholder data at the origin, and then decrypts it at the end destination. Some examples of end-to-end encryption are VPNs, Apple’s imessage feature, and other messaging apps like WhatsApp.

Both tokenization and encryption are used to reduce the scope of PCI Compliance by reducing the amount of systems that have access to customers’ credit card information. (For a primer on PCI compliance, check out our PCI Compliance Guide). While both have their places in payment technology, tokenization is fast emerging as a more cost-effective and secure solution to protecting customer card information and reducing the scope of PCI compliance. Unlike data that is encrypted, tokens are not mathematically reversible with a decryption key and PAN data is never displayed.

Tokenization examples

How is tokenization put to use in the payments industry? Three ways. The first is when businesses keep your “card on file” for subscription billing and recurring payments. The second is on eCommerce sites that offer frequent, returning customers “one-click” checkouts. And the third use (and perhaps the buzziest, as of late) is within NFC mobile wallets like Apple Pay and Android Pay.

Payment tokenization: An explainer

Here’s how tokenization helps protect you in the following payment scenarios:

Apple Pay tokenization. After you take a picture of your credit card and load it into your iPhone 6, Apple sends the details to the card’s issuing bank or network, which replaces your card details with a series of randomly generated numbers (the token). That random number is sent back to Apple, which programs it into the phone. This means that the number stored on the phone can’t be extracted into anything valuable to fraudsters.

Android Pay tokenization. Tokenization in Android Pay works similarly. When you upload your card information into the app, Google creates a stand-in “token,” to represent your actual account number. This makes it near impossible for someone to get at your actual credit card information.

Tokenization within apps. Say you want to buy something straight from an app on your phone — concert tickets, clothes, books, whatever. If your phone contains a token, none of these apps have access to your credit card details. Read: Your bank information is locked down and meaningless to fraudsters. Using a tokenized account also can make it easier to check out, as many apps will link directly to your stored shipping information.

Tokenization in eCommerce. Tokenization also helps protect your online shopping activities. You buy a coffee table on Ikea.com, for example. If IKEA has tokenized the card numbers that it keeps on file, your information is safe even if it gets hacked (which it hasn’t). The retailer may never actually see or store the credit card number, so if someone weasels into the system (like in the Home Depot breach, for example), all the criminal can see is the randomly generated tokens. And here’s something else that’s cool: A new token can be generated for each online retailer — so you’ll have a different code at all the places you’ve shopped. So if a retailer has a security breach, all tokens issued to that website can be disabled without you having to get a replacement card.

In short: Tokenization is a complicated topic, but it’s good to know the basics (and if you’re more visually inclined, we made a simple graphic illustrating how it works above). It’s an exciting evolution in keeping every kind of payment more secure.

FAQs about tokenization

Is tokenized data reversible?
Tokenized data is not mathematically reversible unless you have the original key used to create the token.

How are tokens generated?
Tokens can be generated through mathematically reversible algorithms, one-way non-reversible cryptographic functions, or static tables mapped to randomly generated token values

Does using tokenization make me PCI compliant?
Employing tokenization won’t in and of itself make you PCI compliant, but it’s considered a “best practice” and can help to reduce PCI DSS scope. You can see the PCI Security Standards Council best practices on choosing tokenization providers here. But not to worry, Square provides an affordable, PCI-compliant solution.

Learn more about how payment processing fees work with Square.

Payment Tokenization Explained (4)

Payment Tokenization Explained (2024)
Top Articles
Wand feucht, aber kein Schimmel − was sind die Ursachen?
'It Ends With Us' shows some realities of domestic violence. Here's what it got wrong.
Artem The Gambler
Uca Cheerleading Nationals 2023
Craigslist Campers Greenville Sc
Ymca Sammamish Class Schedule
Blairsville Online Yard Sale
Jonathan Freeman : "Double homicide in Rowan County leads to arrest" - Bgrnd Search
Call of Duty: NEXT Event Intel, How to Watch, and Tune In Rewards
Pbr Wisconsin Baseball
Horned Stone Skull Cozy Grove
Matthew Rotuno Johnson
FIX: Spacebar, Enter, or Backspace Not Working
Cvs Learnet Modules
Funny Marco Birth Chart
Flights To Frankfort Kentucky
Best Food Near Detroit Airport
House Party 2023 Showtimes Near Marcus North Shore Cinema
Belly Dump Trailers For Sale On Craigslist
Nba Rotogrinders Starting Lineups
Interactive Maps: States where guns are sold online most
Apne Tv Co Com
What Happened To Anna Citron Lansky
Kiddle Encyclopedia
Trivago Sf
Kayky Fifa 22 Potential
If you bought Canned or Pouched Tuna between June 1, 2011 and July 1, 2015, you may qualify to get cash from class action settlements totaling $152.2 million
Aldi Bruce B Downs
Jeffers Funeral Home Obituaries Greeneville Tennessee
Cookie Clicker Advanced Method Unblocked
Dal Tadka Recipe - Punjabi Dhaba Style
Downtown Dispensary Promo Code
Login.castlebranch.com
Ncal Kaiser Online Pay
Rugged Gentleman Barber Shop Martinsburg Wv
Primerica Shareholder Account
Daily Jail Count - Harrison County Sheriff's Office - Mississippi
Srg Senior Living Yardi Elearning Login
Streameast.xy2
Craigslist En Brownsville Texas
All Obituaries | Sneath Strilchuk Funeral Services | Funeral Home Roblin Dauphin Ste Rose McCreary MB
Carteret County Busted Paper
Shoecarnival Com Careers
Sour OG is a chill recreational strain -- just have healthy snacks nearby (cannabis review)
Babykeilani
Centimeters to Feet conversion: cm to ft calculator
Port Huron Newspaper
2294141287
Osrs Vorkath Combat Achievements
Ubg98.Github.io Unblocked
Kobe Express Bayside Lakes Photos
Land of Samurai: One Piece’s Wano Kuni Arc Explained
Latest Posts
Article information

Author: Sen. Ignacio Ratke

Last Updated:

Views: 6497

Rating: 4.6 / 5 (76 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Sen. Ignacio Ratke

Birthday: 1999-05-27

Address: Apt. 171 8116 Bailey Via, Roberthaven, GA 58289

Phone: +2585395768220

Job: Lead Liaison

Hobby: Lockpicking, LARPing, Lego building, Lapidary, Macrame, Book restoration, Bodybuilding

Introduction: My name is Sen. Ignacio Ratke, I am a adventurous, zealous, outstanding, agreeable, precious, excited, gifted person who loves writing and wants to share my knowledge and understanding with you.