{"id":12497,"date":"2016-10-18T10:53:15","date_gmt":"2016-10-18T10:53:15","guid":{"rendered":"https:\/\/projecthermes.wpengine.com\/part-2-security-tokenization-with-interac-tsp\/"},"modified":"2023-06-05T15:16:38","modified_gmt":"2023-06-05T19:16:38","slug":"part-2-security-tokenization-with-interac-tsp","status":"publish","type":"post","link":"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/","title":{"rendered":"Security &#038; Tokenization with INTERAC\u00ae TSP | 2 of 3"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><em>In the second of three blog posts on our pioneering Interac TSP offering, we look at the security of its token provisioning process.<\/em><\/p>\n<p>Both our brand and our values as a company have always been based on the principle of trust, and one of the foundational elements of that trust is user security. <a href=\"https:\/\/innovation.interac.ca\/fr\/introtsp_one\/?cat=blog\"><span style=\"text-decoration: underline;\">As discussed in our first post<\/span><\/a> on our Interac TSP offering, tokenization ensures security by keeping personal account numbers away from transactions between users and merchants, replacing real account numbers with uniquely-assigned but randomly-generated tokens.<\/p>\n<p>This minimizes the risk from third-party eavesdropping on the transaction. But what if a user\u2019s phone has been stolen? A second and equally important method used by our platform to protect users is the provisioning process, which governs how (and whether) a tokenized payment credential is enabled on a mobile wallet of a mobile device.<\/p>\n<p>When a user first initializes their mobile wallet, a request with the user\u2019s card information is sent by the mobile device to the Interac TSP, asking for authorization to provision payment credentials on the mobile device. At this point one of three things will happen:<\/p>\n<ol>\n<li>If the financial institution has pre-authenticated the user (or knows enough about the user to approve the request immediately), the financial institution will send its approval to the Interac TSP and payment credentials will be immediately provisioned. This path is sometimes referred to as the \u201cgreen flow\u201d scenario.<\/li>\n<li>More typically, the financial institution will require additional information to authenticate the user, and will provide one or more authentication options for the user to choose \u2013 for example, the user may be provided a one-time-password via text or email (the user would enter this into the mobile wallet, which would in turn validate the password with the financial institution), may phone into the financial institution\u2019s call centre, or may log on to the financial institution\u2019s mobile banking application on the same mobile device. Once the financial institution authenticates the user through any of these methods, it will send the Interac TSP an approval message and payment credentials will be provisioned. This is the \u201cyellow flow\u201d scenario \u2013 the standard approach for OEM Wallets, under our offering.<\/li>\n<li>Finally, for a variety of reasons a financial institution may simply decline the user\u2019s request for payment credentials. These provisioning processes mean that the significant investments made by financial institutions over the years to be able to reliably authenticate their clients in ways other than face-to-face \u2013 whether they\u2019re checking their accounts online or asking call centre representatives for increased limits on their cards \u2013 are now part of a multiple-factor verification regime ensuring a user\u2019s mobile wallet cannot be provisioned with payment credentials after being stolen or cloned. Provisioning is not only a good thing for users and financial institutions, but a good thing for merchants too, who will face a far reduced risk of fraud and will enjoy a much higher certainty that their valued customers are exactly who they say they are when using their mobile wallets to pay.<\/li>\n<\/ol>\n<p>What\u2019s more, the fact that authentication is the responsibility of the financial institutions, while the creation and management of tokens is the responsibility of the Interac TSP, means that each of these two critical functions are being run by the entity most capable of securing it \u2013 yet another proof point for our conviction that partnerships bring the best talents to the table and create the best solutions. And as we all know, in matters of financial security, \u201cbest\u201d is a minimum requirement.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the second of three blog posts on our pioneering Interac TSP offering, we look at the security of its token provisioning process.<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[150,155],"tags":[],"posts_format":[112],"class_list":["post-12497","post","type-post","status-publish","format-standard","hentry","category-creation-de-jetons","category-fournisseur-de-service-de-jeton-interac","posts_format-article-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Innovation Hub - Security &#038; Tokenization with INTERAC\u00ae TSP | 2 of 3<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security &amp; Tokenization with INTERAC\u00ae TSP | 2 of 3\" \/>\n<meta property=\"og:description\" content=\"In the second of three blog posts on our pioneering Interac TSP offering, we look at the security of its token provisioning process.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation Hub\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/interac\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-18T10:53:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-06-05T19:16:38+00:00\" \/>\n<meta name=\"author\" content=\"Kashmera Self\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@interac\" \/>\n<meta name=\"twitter:site\" content=\"@interac\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kashmera Self\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/part-2-security-tokenization-with-interac-tsp\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/part-2-security-tokenization-with-interac-tsp\\\/\"},\"author\":{\"name\":\"Kashmera Self\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/person\\\/c8385bc8806cb2d9146ba50fb702e88c\"},\"headline\":\"Security &#038; Tokenization with INTERAC\u00ae TSP | 2 of 3\",\"datePublished\":\"2016-10-18T10:53:15+00:00\",\"dateModified\":\"2023-06-05T19:16:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/part-2-security-tokenization-with-interac-tsp\\\/\"},\"wordCount\":598,\"publisher\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#organization\"},\"articleSection\":[\"Cr\u00e9ation de jetons\",\"Fournisseur de service de jeton Interac\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/part-2-security-tokenization-with-interac-tsp\\\/\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/part-2-security-tokenization-with-interac-tsp\\\/\",\"name\":\"Security & Tokenization with INTERAC\u00ae TSP | 2 of 3 - Innovation Hub\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#website\"},\"datePublished\":\"2016-10-18T10:53:15+00:00\",\"dateModified\":\"2023-06-05T19:16:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/part-2-security-tokenization-with-interac-tsp\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/part-2-security-tokenization-with-interac-tsp\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/part-2-security-tokenization-with-interac-tsp\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security &#038; Tokenization with INTERAC\u00ae TSP | 2 of 3\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/\",\"name\":\"Innovation Hub\",\"description\":\"Innovation Hub\",\"publisher\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#organization\",\"name\":\"Interac\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Interac_TwoColour_RGB.png\",\"contentUrl\":\"https:\\\/\\\/innovation.interac.ca\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Interac_TwoColour_RGB.png\",\"width\":2210,\"height\":2210,\"caption\":\"Interac\"},\"image\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/interac\",\"https:\\\/\\\/x.com\\\/interac\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/InteracBrand\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/interac-corp\\\/\",\"https:\\\/\\\/www.instagram.com\\\/interac\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/person\\\/c8385bc8806cb2d9146ba50fb702e88c\",\"name\":\"Kashmera Self\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g\",\"caption\":\"Kashmera Self\"},\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/author\\\/kselfinterac-ca\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Innovation Hub - Security &#038; Tokenization with INTERAC\u00ae TSP | 2 of 3","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/","og_locale":"fr_FR","og_type":"article","og_title":"Security & Tokenization with INTERAC\u00ae TSP | 2 of 3","og_description":"In the second of three blog posts on our pioneering Interac TSP offering, we look at the security of its token provisioning process.","og_url":"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/","og_site_name":"Innovation Hub","article_publisher":"https:\/\/www.facebook.com\/interac","article_published_time":"2016-10-18T10:53:15+00:00","article_modified_time":"2023-06-05T19:16:38+00:00","author":"Kashmera Self","twitter_card":"summary_large_image","twitter_creator":"@interac","twitter_site":"@interac","twitter_misc":{"\u00c9crit par":"Kashmera Self","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/#article","isPartOf":{"@id":"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/"},"author":{"name":"Kashmera Self","@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/person\/c8385bc8806cb2d9146ba50fb702e88c"},"headline":"Security &#038; Tokenization with INTERAC\u00ae TSP | 2 of 3","datePublished":"2016-10-18T10:53:15+00:00","dateModified":"2023-06-05T19:16:38+00:00","mainEntityOfPage":{"@id":"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/"},"wordCount":598,"publisher":{"@id":"https:\/\/innovation.interac.ca\/fr\/#organization"},"articleSection":["Cr\u00e9ation de jetons","Fournisseur de service de jeton Interac"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/","url":"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/","name":"Security & Tokenization with INTERAC\u00ae TSP | 2 of 3 - Innovation Hub","isPartOf":{"@id":"https:\/\/innovation.interac.ca\/fr\/#website"},"datePublished":"2016-10-18T10:53:15+00:00","dateModified":"2023-06-05T19:16:38+00:00","breadcrumb":{"@id":"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/innovation.interac.ca\/fr\/part-2-security-tokenization-with-interac-tsp\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/innovation.interac.ca\/fr\/"},{"@type":"ListItem","position":2,"name":"Security &#038; Tokenization with INTERAC\u00ae TSP | 2 of 3"}]},{"@type":"WebSite","@id":"https:\/\/innovation.interac.ca\/fr\/#website","url":"https:\/\/innovation.interac.ca\/fr\/","name":"Innovation Hub","description":"Innovation Hub","publisher":{"@id":"https:\/\/innovation.interac.ca\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/innovation.interac.ca\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/innovation.interac.ca\/fr\/#organization","name":"Interac","url":"https:\/\/innovation.interac.ca\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2023\/11\/Interac_TwoColour_RGB.png","contentUrl":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2023\/11\/Interac_TwoColour_RGB.png","width":2210,"height":2210,"caption":"Interac"},"image":{"@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/interac","https:\/\/x.com\/interac","https:\/\/www.youtube.com\/user\/InteracBrand","https:\/\/www.linkedin.com\/company\/interac-corp\/","https:\/\/www.instagram.com\/interac\/"]},{"@type":"Person","@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/person\/c8385bc8806cb2d9146ba50fb702e88c","name":"Kashmera Self","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g","caption":"Kashmera Self"},"url":"https:\/\/innovation.interac.ca\/fr\/author\/kselfinterac-ca\/"}]}},"_links":{"self":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts\/12497","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/comments?post=12497"}],"version-history":[{"count":0,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts\/12497\/revisions"}],"wp:attachment":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/media?parent=12497"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/categories?post=12497"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/tags?post=12497"},{"taxonomy":"posts_format","embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts_format?post=12497"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}