Site icon Cyber Insights

Reduce Fraud with Payment Token

Payment Token is simply using a surrogate of the  primary account number (PAN) of a payment card to process a payment transaction instead of the actual  card PAN.  Token payment helps to secure the actual card details from the bad guys because  the actual card data is never required to be entered  again to make a payment. It helps merchants to reduce the scope of PCI  DSS and enhances the convenience of both online and in-store transactions.

Payment Token Generation:  

Payment Tokens are usually generated by the Token Service Provider (TSP) as defined by EMV.

 The process is as follows: 

The Merchant can then use the Token  for payment depending on the Token domain restrictions. 

The Token domain restrictions are defined at the time of the payment token request. e.g the restriction could be that the Token is only permitted for e-commerce transactions,  only be used via NFC or both. It also, specifies where the Token shall be stored such as on-file, shared storage, on phone etc. This specified location cannot be changed throughout the Token lifecycle. 

The Token Requestor is responsible for  managing and controlling how have access to the Payment Token. 

The card issuer is responsible for validating how the cardholder was authenticated (usually referred as cardholder verification method) before authorising the TSP to generated a Token for the corresponding PAN.

A PAN (card) can have multiple Payment Tokens associated to it. This could be used for different purposes by different merchants. 

Token Users (merchant) usually have a direct relationship with the Token Requestor especially where the Payment Token is used by multiple merchants – this is referred to as Shared Payment Token.

Token Payment: 

To make a payment with Tokens, the merchant has to get the Token either from its storage or from the user device (like in Apple and Android Pay) and pass it on to the TSP as follows:

The only major difference here  is that a Token is used in place of a PAN and the involvement of a TSP. All the other things are the same as using the card PAN to process a payment transaction.

Tokenization of sensitive authentication data (including magnetic stripe data or equivalent on a chip, CAV2 / CVC2 / CVV2 / CID data, and PINs/PIN blocks) is not permitted per PCI DSS Requirement 3.2. 

Benefits of Token Payment:

Token Payment provides lots of benefits especially in helping the merchant to reduce the scope of PCI DSS . According to PCI

If a Token Payment is implemented properly, the merchant only needs to handle the PAN at the point of capture and afterwards, deals with only Tokens which cannot be reversed or at least is of lesser value to an attacker. 

De-tokenization is usually handled by the TSP, so, doesn’t concern the merchant. 

This goes along way in reducing liabilities on the merchant side and as well preventing the user payment card data from being harvested by attackers in case of a security breach.

Token Payment makes online payment more secure and convenient. 

Exit mobile version