SlideShare a Scribd company logo
Tokanization
Vinod Amarathunga
Financial Solution Support Group
DMS Electronics (Pvt) Ltd
What is Tokenization ?
What is Tokenization ?
The Actual Meaning
Actual Data Algorithm Token
What is Tokenization ?
How it works ?
Mobile
Payment System Provider
Card Details Request
Response
Acquire
Token Request
Token
Tokenization in Nutshell
What is Tokenization ?
 Protects cardholder by replacing the PAN with a ‘surrogate’
account number, a Token PAN
 Transactions still pass through terminals, acquirers and
networks
 Token PAN domain controls restrict use
 EMV Co published global framework in Mar 2014
Tokenization in Nutshell
Tokenization scope
 Token generation
 Token provisioning (with payment data) to phone
 Storing Token/PAN map
 De-tokenisation for authorizations and clearing
Wider use of Tokenization
 Mobile, Card on File, in-App purchases
Token Service Provider Requirements
Token Vault Requirements
 Payment Token to PAN mapping
 Provide underlying security
 Related processing controls, such as domain restrictions during
transaction processing
Domain Restrictions
The token is requested by and specific to individual
merchants
Token Service Provider Requirements
 Token Service Provider generates Payment Tokens in response to
Payment Token Requests
 No possibility of generating Payment Tokens that conflict with a PAN
 Identify and store the Payment Token to PAN mapping
 The Token Vault SHALL also associate each generated Payment
Token
Token Service Provider Requirements
Security and Controls
Due to the sensitive nature of the data mappings
that are stored and managed in them, Token
Vaults SHALL be protected by strong physical and
logical security measures per industry standards
Token Requestor Registration
The Token Service Provider SHALL establish a process to
register the entities that request designation as a Token
Requestor. Entities that choose to be recognized as a
Token Requestor for multiple Token Service Providers may
register separately with each Token Service Provider,
according to the proprietary processes established by each
Token Service Provider
Token Service ProviderToken Requestor
Token Requestor
Information
Token Requestor ID
Token Service Provider APIs
Token Service Authenticated Methods
Web services (REST)
ISO 8583 message exchange through an
existing Payment Network interface
File / batch
Token Service Provider APIs
Input & Output Data Elements Tokenization
Token Requestor Token Service ProviderCard Data
PAN /PAN Expiry Date
PAN /PAN Expiry Date
Token Requestor ID
Status of the request
Payment Token
Payment Token Expiry Date
Token Service Provider APIs
Input & Output Data Elements De-Tokenization
De-Token Requestor Token Service ProviderToken
Transaction Request
Token Requestor ID
Token Length
Payment Token
Token Expiry Date
Status of the Transaction
Use Cases
Mobile / Digital Wallet E-Commerce
Mobile NFC at Point of Sale Flow
Card-On-File E-Commerce
Scan at Point of Sale
References
1. EMV® Payment Tokenization Specification
2. YouTube: Tokenization in 60s
3. YouTube: How does tokenization work ?
4. YouTube: Apple Pay: How Does It Work?! -
Tech Tuesday
5. YouTube: What Is Tokenization?
6. Thales Proxama HCE CBP Webinar v4 19 May
2016
v 1.0

More Related Content

What's hot

Online banking||
Online banking||Online banking||
Online banking||
hemanth sanju
 
ISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de EntrustISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de Entrust
Information Security Services SA
 
Online banking ppt
Online banking pptOnline banking ppt
Online banking ppt
Vishnu V S
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
Ajilal
 
online banking
online bankingonline banking
online banking
Rajat Goyal
 
Online banking
Online bankingOnline banking
Online banking
Preet Raj
 
oauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-accessoauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-access
idsecconf
 
21 ijcse-01230
21 ijcse-0123021 ijcse-01230
21 ijcse-01230
Shivlal Mewada
 
Electronic Money (E-Money) & Security
Electronic Money (E-Money) & SecurityElectronic Money (E-Money) & Security
Electronic Money (E-Money) & Security
Clinton Dsouza
 
Online banking
Online bankingOnline banking
Online banking
purva kudalkar
 
E-Banking 2009
E-Banking 2009E-Banking 2009
E-Banking 2009
keerthi123
 
Internet banking
Internet bankingInternet banking
Internet banking
Srikanth Gelli
 
Telebanking
TelebankingTelebanking
Telebanking
palsantosh
 
E banking
E   bankingE   banking
E banking
Priyanka Shinde
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
eMudhra dsc
 
E banking security
E banking securityE banking security
E banking security
Iman Rahmanian
 
Wallet mobile-ui-presentation
Wallet mobile-ui-presentationWallet mobile-ui-presentation
Wallet mobile-ui-presentation
Velmie
 
Pakistan e services portal project
Pakistan e services portal projectPakistan e services portal project
Pakistan e services portal project
Syed Raza
 
Online banking
Online bankingOnline banking
Online banking
RanvirSingh133
 
PPT eBanking
PPT eBankingPPT eBanking
PPT eBanking
James Makumbi
 

What's hot (20)

Online banking||
Online banking||Online banking||
Online banking||
 
ISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de EntrustISS SA le presenta IdentityGuard Mobile de Entrust
ISS SA le presenta IdentityGuard Mobile de Entrust
 
Online banking ppt
Online banking pptOnline banking ppt
Online banking ppt
 
Internet Banking
Internet BankingInternet Banking
Internet Banking
 
online banking
online bankingonline banking
online banking
 
Online banking
Online bankingOnline banking
Online banking
 
oauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-accessoauth-for-credentials-security-in-rest-api-access
oauth-for-credentials-security-in-rest-api-access
 
21 ijcse-01230
21 ijcse-0123021 ijcse-01230
21 ijcse-01230
 
Electronic Money (E-Money) & Security
Electronic Money (E-Money) & SecurityElectronic Money (E-Money) & Security
Electronic Money (E-Money) & Security
 
Online banking
Online bankingOnline banking
Online banking
 
E-Banking 2009
E-Banking 2009E-Banking 2009
E-Banking 2009
 
Internet banking
Internet bankingInternet banking
Internet banking
 
Telebanking
TelebankingTelebanking
Telebanking
 
E banking
E   bankingE   banking
E banking
 
What is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhraWhat is Digital Signature, Digital Signature FAQ - eMudhra
What is Digital Signature, Digital Signature FAQ - eMudhra
 
E banking security
E banking securityE banking security
E banking security
 
Wallet mobile-ui-presentation
Wallet mobile-ui-presentationWallet mobile-ui-presentation
Wallet mobile-ui-presentation
 
Pakistan e services portal project
Pakistan e services portal projectPakistan e services portal project
Pakistan e services portal project
 
Online banking
Online bankingOnline banking
Online banking
 
PPT eBanking
PPT eBankingPPT eBanking
PPT eBanking
 

Viewers also liked

EMV Security / A Key Component to a Multi-layered Security Approach
EMV Security / A Key Component to a Multi-layered Security ApproachEMV Security / A Key Component to a Multi-layered Security Approach
EMV Security / A Key Component to a Multi-layered Security Approach
Ingenico Group
 
Emv chip card buyers guide
Emv chip card buyers guideEmv chip card buyers guide
Emv chip card buyers guide
3D Merchant powered by CenPOS
 
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
EuronetGDCLearning
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
Philip Andreae
 
ISO8583 MySQL UDF Manual
ISO8583 MySQL UDF ManualISO8583 MySQL UDF Manual
ISO8583 MySQL UDF Manual
sybond
 
Iso8583
Iso8583Iso8583
Iso8583
Duy Do Phan
 
EMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next StepsEMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next Steps
Ingenico Group
 
ISO 8583 Financial Message Format
ISO 8583 Financial Message FormatISO 8583 Financial Message Format
ISO 8583 Financial Message Format
Md. Hasan Basri (Angel)
 
Exploring Payment Platforms - ISO 20022 and ISO 8583
Exploring Payment Platforms - ISO 20022 and ISO 8583Exploring Payment Platforms - ISO 20022 and ISO 8583
Exploring Payment Platforms - ISO 20022 and ISO 8583
PECB
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
Dilip Kumar
 
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip CardsReport on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Darshana Senavirathna
 
Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
Narudom Roongsiriwong, CISSP
 
Стандарты ISO по ИБ (ТК 68)
Стандарты ISO по ИБ (ТК 68)Стандарты ISO по ИБ (ТК 68)
Стандарты ISO по ИБ (ТК 68)
Aleksey Lukatskiy
 
Unified Payment Interface
Unified Payment InterfaceUnified Payment Interface
Unified Payment Interface
Akash Chandra
 
India - A Cashless Economy (NPCI/UPI)
India - A Cashless Economy (NPCI/UPI)India - A Cashless Economy (NPCI/UPI)
India - A Cashless Economy (NPCI/UPI)
Aravind Krishnaswamy
 

Viewers also liked (16)

Freeport hsc42
Freeport hsc42Freeport hsc42
Freeport hsc42
 
EMV Security / A Key Component to a Multi-layered Security Approach
EMV Security / A Key Component to a Multi-layered Security ApproachEMV Security / A Key Component to a Multi-layered Security Approach
EMV Security / A Key Component to a Multi-layered Security Approach
 
Emv chip card buyers guide
Emv chip card buyers guideEmv chip card buyers guide
Emv chip card buyers guide
 
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
C:\Documents And Settings\Schavan\My Documents\Euronet Training\Final\Intro T...
 
EMV 201 EMF June 2016
EMV 201 EMF June 2016EMV 201 EMF June 2016
EMV 201 EMF June 2016
 
ISO8583 MySQL UDF Manual
ISO8583 MySQL UDF ManualISO8583 MySQL UDF Manual
ISO8583 MySQL UDF Manual
 
Iso8583
Iso8583Iso8583
Iso8583
 
EMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next StepsEMV Migration Webinar / Lessons Learned + Next Steps
EMV Migration Webinar / Lessons Learned + Next Steps
 
ISO 8583 Financial Message Format
ISO 8583 Financial Message FormatISO 8583 Financial Message Format
ISO 8583 Financial Message Format
 
Exploring Payment Platforms - ISO 20022 and ISO 8583
Exploring Payment Platforms - ISO 20022 and ISO 8583Exploring Payment Platforms - ISO 20022 and ISO 8583
Exploring Payment Platforms - ISO 20022 and ISO 8583
 
EMV chip cards
EMV chip cardsEMV chip cards
EMV chip cards
 
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip CardsReport on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
Report on ISO8583,EDCPOS vs mPOS and EMV vs Magnetic Strip Cards
 
Payment Card System Overview
Payment Card System OverviewPayment Card System Overview
Payment Card System Overview
 
Стандарты ISO по ИБ (ТК 68)
Стандарты ISO по ИБ (ТК 68)Стандарты ISO по ИБ (ТК 68)
Стандарты ISO по ИБ (ТК 68)
 
Unified Payment Interface
Unified Payment InterfaceUnified Payment Interface
Unified Payment Interface
 
India - A Cashless Economy (NPCI/UPI)
India - A Cashless Economy (NPCI/UPI)India - A Cashless Economy (NPCI/UPI)
India - A Cashless Economy (NPCI/UPI)
 

Similar to v 1.0

Ch17
Ch17Ch17
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?
Rambus Inc
 
EMV Overview
EMV OverviewEMV Overview
Secure electronic transactions (SET)
Secure electronic transactions (SET)Secure electronic transactions (SET)
Secure electronic transactions (SET)
Omar Ghazi
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
Ramesh Ogania
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
koolkampus
 
Best Law Firms in India - Khaitan Legal Associates.pptx
Best Law Firms in India - Khaitan Legal Associates.pptxBest Law Firms in India - Khaitan Legal Associates.pptx
Best Law Firms in India - Khaitan Legal Associates.pptx
Rani Sinha
 
Corporate Law Firms in India - Khaitan Legal Associates.pdf
Corporate Law Firms in India - Khaitan Legal Associates.pdfCorporate Law Firms in India - Khaitan Legal Associates.pdf
Corporate Law Firms in India - Khaitan Legal Associates.pdf
Rani Sinha
 
Tokenisation 2.0
Tokenisation 2.0Tokenisation 2.0
Tokenisation 2.0
Madhuka De Silva
 
Smart Card to the Cloud for Convenient, Secured NFC Payment
Smart Card to the Cloud for Convenient, Secured NFC PaymentSmart Card to the Cloud for Convenient, Secured NFC Payment
Smart Card to the Cloud for Convenient, Secured NFC Payment
Sazzadur Rahaman
 
Smart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc paymentSmart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc payment
Kona Software Lab Limited.
 
Tim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovationTim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovation
CO-OPFinancialServices
 
HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015
Chandra Patni
 
Ch 2
Ch 2Ch 2
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
Dr.Florence Dayana
 
Open web payments
Open web paymentsOpen web payments
Open web payments
Praveen Alavilli
 
Week3 lecture
Week3 lectureWeek3 lecture
Week3 lecture
Shaikha AlQaydi
 
Blockchains.My - Decentralised Mobile Wallet App
Blockchains.My - Decentralised Mobile Wallet AppBlockchains.My - Decentralised Mobile Wallet App
Blockchains.My - Decentralised Mobile Wallet App
Raja Muhd Amiruddin Raja Chulan
 
Access management
Access managementAccess management
Access management
Venkatesh Jambulingam
 
Web Security
Web SecurityWeb Security
Web Security
Ram Dutt Shukla
 

Similar to v 1.0 (20)

Ch17
Ch17Ch17
Ch17
 
What is Payment Tokenization?
What is Payment Tokenization?What is Payment Tokenization?
What is Payment Tokenization?
 
EMV Overview
EMV OverviewEMV Overview
EMV Overview
 
Secure electronic transactions (SET)
Secure electronic transactions (SET)Secure electronic transactions (SET)
Secure electronic transactions (SET)
 
SSL TSL;& SET
SSL TSL;& SETSSL TSL;& SET
SSL TSL;& SET
 
Web Security in Network Security NS7
Web Security in Network Security NS7Web Security in Network Security NS7
Web Security in Network Security NS7
 
Best Law Firms in India - Khaitan Legal Associates.pptx
Best Law Firms in India - Khaitan Legal Associates.pptxBest Law Firms in India - Khaitan Legal Associates.pptx
Best Law Firms in India - Khaitan Legal Associates.pptx
 
Corporate Law Firms in India - Khaitan Legal Associates.pdf
Corporate Law Firms in India - Khaitan Legal Associates.pdfCorporate Law Firms in India - Khaitan Legal Associates.pdf
Corporate Law Firms in India - Khaitan Legal Associates.pdf
 
Tokenisation 2.0
Tokenisation 2.0Tokenisation 2.0
Tokenisation 2.0
 
Smart Card to the Cloud for Convenient, Secured NFC Payment
Smart Card to the Cloud for Convenient, Secured NFC PaymentSmart Card to the Cloud for Convenient, Secured NFC Payment
Smart Card to the Cloud for Convenient, Secured NFC Payment
 
Smart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc paymentSmart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc payment
 
Tim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovationTim sloane preparing for rapid payments innovation
Tim sloane preparing for rapid payments innovation
 
HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015HCE cloud payments internet services August 2015
HCE cloud payments internet services August 2015
 
Ch 2
Ch 2Ch 2
Ch 2
 
NETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptxNETWORK SECURITY-SET.pptx
NETWORK SECURITY-SET.pptx
 
Open web payments
Open web paymentsOpen web payments
Open web payments
 
Week3 lecture
Week3 lectureWeek3 lecture
Week3 lecture
 
Blockchains.My - Decentralised Mobile Wallet App
Blockchains.My - Decentralised Mobile Wallet AppBlockchains.My - Decentralised Mobile Wallet App
Blockchains.My - Decentralised Mobile Wallet App
 
Access management
Access managementAccess management
Access management
 
Web Security
Web SecurityWeb Security
Web Security
 

v 1.0

  • 1. Tokanization Vinod Amarathunga Financial Solution Support Group DMS Electronics (Pvt) Ltd
  • 3. What is Tokenization ? The Actual Meaning Actual Data Algorithm Token
  • 4. What is Tokenization ? How it works ? Mobile Payment System Provider Card Details Request Response Acquire Token Request Token
  • 5. Tokenization in Nutshell What is Tokenization ?  Protects cardholder by replacing the PAN with a ‘surrogate’ account number, a Token PAN  Transactions still pass through terminals, acquirers and networks  Token PAN domain controls restrict use  EMV Co published global framework in Mar 2014
  • 6. Tokenization in Nutshell Tokenization scope  Token generation  Token provisioning (with payment data) to phone  Storing Token/PAN map  De-tokenisation for authorizations and clearing Wider use of Tokenization  Mobile, Card on File, in-App purchases
  • 7. Token Service Provider Requirements Token Vault Requirements  Payment Token to PAN mapping  Provide underlying security  Related processing controls, such as domain restrictions during transaction processing Domain Restrictions The token is requested by and specific to individual merchants
  • 8. Token Service Provider Requirements  Token Service Provider generates Payment Tokens in response to Payment Token Requests  No possibility of generating Payment Tokens that conflict with a PAN  Identify and store the Payment Token to PAN mapping  The Token Vault SHALL also associate each generated Payment Token
  • 9. Token Service Provider Requirements Security and Controls Due to the sensitive nature of the data mappings that are stored and managed in them, Token Vaults SHALL be protected by strong physical and logical security measures per industry standards
  • 10. Token Requestor Registration The Token Service Provider SHALL establish a process to register the entities that request designation as a Token Requestor. Entities that choose to be recognized as a Token Requestor for multiple Token Service Providers may register separately with each Token Service Provider, according to the proprietary processes established by each Token Service Provider Token Service ProviderToken Requestor Token Requestor Information Token Requestor ID
  • 11. Token Service Provider APIs Token Service Authenticated Methods Web services (REST) ISO 8583 message exchange through an existing Payment Network interface File / batch
  • 12. Token Service Provider APIs Input & Output Data Elements Tokenization Token Requestor Token Service ProviderCard Data PAN /PAN Expiry Date PAN /PAN Expiry Date Token Requestor ID Status of the request Payment Token Payment Token Expiry Date
  • 13. Token Service Provider APIs Input & Output Data Elements De-Tokenization De-Token Requestor Token Service ProviderToken Transaction Request Token Requestor ID Token Length Payment Token Token Expiry Date Status of the Transaction
  • 14. Use Cases Mobile / Digital Wallet E-Commerce Mobile NFC at Point of Sale Flow Card-On-File E-Commerce Scan at Point of Sale
  • 15. References 1. EMV® Payment Tokenization Specification 2. YouTube: Tokenization in 60s 3. YouTube: How does tokenization work ? 4. YouTube: Apple Pay: How Does It Work?! - Tech Tuesday 5. YouTube: What Is Tokenization? 6. Thales Proxama HCE CBP Webinar v4 19 May 2016