{"id":12554,"date":"2018-11-05T14:30:52","date_gmt":"2018-11-05T14:30:52","guid":{"rendered":"https:\/\/projecthermes.wpengine.com\/tokenization-and-mobile-payments-security-part-2-of-2\/"},"modified":"2023-08-11T14:03:13","modified_gmt":"2023-08-11T18:03:13","slug":"tokenization-and-mobile-payments-security-part-2-of-2","status":"publish","type":"post","link":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/","title":{"rendered":"Tokenization and Mobile Payments Security: Part 2 of 2"},"content":{"rendered":"<p>In our <a class=\"link-orange\" href=\"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-1-of-2\/\" rel=\"noopener\">last post on mobile payments security<\/a>, we discussed how tokenization allows both customer and merchant to complete mobile transactions without having to worry about the potential theft of personal financial information. This is only one part of the total security equation, however, because a merchant still needs to be sure that the tokenized card information being used in the transaction is authentic, and traceable back to the card issuer. For this, cryptograms are used.<\/p>\n<p>A cryptogram is simply a cryptographic \u201chash\u201d created from certain data elements in a given transaction: for example, the transaction date and time, its authorized amount, the card issuer\u2019s master key, and so on. The cryptogram itself is an alphanumeric string that is impossible to decode (well, at least not without billions of years of computing time available) and that serves as proof that the card being used is authentic. And because the cryptogram is generated from a unique set of elements for each transaction, it is a \u00ab\u00a0one-time-use\u00a0\u00bb data package that has no value to thieves who may wish to use it in a later transaction.<\/p>\n<p>In the world of payments, cryptograms have been in use for many years as a means of securing transactions made physically via the EMV chip-and-pin standard (<a class=\"link-orange\" href=\"https:\/\/www.creditcardinsider.com\/learn\/chip-and-signature-chip-and-pin-emv-cards\/\" target=\"_blank\" rel=\"noopener\">click here for a helpful overview<\/a>). While users prove who they are by entering a PIN into a point-of-sale keypad, cards themselves prove that they are not counterfeit by generating cryptograms that can be verified by the issuer before a transaction completes.<\/p>\n<p>For mobile payments, there is an equivalent need to authenticate every transaction to ensure, for example, that tokenized card information \u2013 which in itself may be valid \u2013 is being transmitted by a digital wallet that has not been counterfeited. So before an <em>Interac<\/em> Debit transaction is completed on a mobile device:<\/p>\n<p><strong>(1)<\/strong> The merchant enters payment details, including unique information associated with the transaction, and this is sent to Interac&rsquo;s Mobile Debit Application (MDA) running on the mobile device.<\/p>\n<p><strong>(2)<\/strong> The MDA takes the terminal and merchant information, and combines it with the debit card&rsquo;s master key as input into the generation of a one-time-use cryptogram.<\/p>\n<p><strong>(3)<\/strong> In this way, the digital wallet cryptographically \u00ab\u00a0signs\u00a0\u00bb the transaction, proving it comes from a legitimate wallet and that it has not been altered. The merchant&rsquo;s system passes the cryptogram to the Token Service Provider for validation with the Issuer, and the transaction is authorized for processing.<\/p>\n<p>Interac\u2019s MDA, in short, takes the strong, well-trusted security provided by the EMV chip-and-pin architecture and rebuilds it within a mobile payments environment. Invisible to the user and easy to implement for the merchant, MDA cryptograms work with tokenization to create a bulletproof security halo around mobile in-app and in-browser payments.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In our last post on mobile payments security, we discussed how tokenization allows both customer and merchant to complete mobile transactions without having to worry about the potential theft of personal financial information. This is only one part of the total security equation, however, because a merchant still needs to be sure that the tokenized&#8230;<\/p>\n","protected":false},"author":9,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[150,155],"tags":[],"posts_format":[112],"class_list":["post-12554","post","type-post","status-publish","format-standard","hentry","category-creation-de-jetons","category-fournisseur-de-service-de-jeton-interac","posts_format-article-fr"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.4 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Innovation Hub - Tokenization and Mobile Payments Security: Part 2 of 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Tokenization and Mobile Payments Security: Part 2 of 2\" \/>\n<meta property=\"og:description\" content=\"In our last post on mobile payments security, we discussed how tokenization allows both customer and merchant to complete mobile transactions without having to worry about the potential theft of personal financial information. This is only one part of the total security equation, however, because a merchant still needs to be sure that the tokenized...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Innovation Hub\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/interac\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-05T14:30:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-08-11T18:03:13+00:00\" \/>\n<meta name=\"author\" content=\"Kashmera Self\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@interac\" \/>\n<meta name=\"twitter:site\" content=\"@interac\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kashmera Self\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-2-of-2\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-2-of-2\\\/\"},\"author\":{\"name\":\"Kashmera Self\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/person\\\/c8385bc8806cb2d9146ba50fb702e88c\"},\"headline\":\"Tokenization and Mobile Payments Security: Part 2 of 2\",\"datePublished\":\"2018-11-05T14:30:52+00:00\",\"dateModified\":\"2023-08-11T18:03:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-2-of-2\\\/\"},\"wordCount\":464,\"publisher\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#organization\"},\"articleSection\":[\"Cr\u00e9ation de jetons\",\"Fournisseur de service de jeton Interac\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-2-of-2\\\/\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-2-of-2\\\/\",\"name\":\"Tokenization and Mobile Payments Security: Part 2 of 2 - Innovation Hub\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#website\"},\"datePublished\":\"2018-11-05T14:30:52+00:00\",\"dateModified\":\"2023-08-11T18:03:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-2-of-2\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-2-of-2\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/tokenization-and-mobile-payments-security-part-2-of-2\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tokenization and Mobile Payments Security: Part 2 of 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/\",\"name\":\"Innovation Hub\",\"description\":\"Innovation Hub\",\"publisher\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#organization\",\"name\":\"Interac\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Interac_TwoColour_RGB.png\",\"contentUrl\":\"https:\\\/\\\/innovation.interac.ca\\\/wp-content\\\/uploads\\\/2023\\\/11\\\/Interac_TwoColour_RGB.png\",\"width\":2210,\"height\":2210,\"caption\":\"Interac\"},\"image\":{\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/interac\",\"https:\\\/\\\/x.com\\\/interac\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/InteracBrand\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/interac-corp\\\/\",\"https:\\\/\\\/www.instagram.com\\\/interac\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/#\\\/schema\\\/person\\\/c8385bc8806cb2d9146ba50fb702e88c\",\"name\":\"Kashmera Self\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g\",\"caption\":\"Kashmera Self\"},\"url\":\"https:\\\/\\\/innovation.interac.ca\\\/fr\\\/author\\\/kselfinterac-ca\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Innovation Hub - Tokenization and Mobile Payments Security: Part 2 of 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/","og_locale":"fr_FR","og_type":"article","og_title":"Tokenization and Mobile Payments Security: Part 2 of 2","og_description":"In our last post on mobile payments security, we discussed how tokenization allows both customer and merchant to complete mobile transactions without having to worry about the potential theft of personal financial information. This is only one part of the total security equation, however, because a merchant still needs to be sure that the tokenized...","og_url":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/","og_site_name":"Innovation Hub","article_publisher":"https:\/\/www.facebook.com\/interac","article_published_time":"2018-11-05T14:30:52+00:00","article_modified_time":"2023-08-11T18:03:13+00:00","author":"Kashmera Self","twitter_card":"summary_large_image","twitter_creator":"@interac","twitter_site":"@interac","twitter_misc":{"\u00c9crit par":"Kashmera Self","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/#article","isPartOf":{"@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/"},"author":{"name":"Kashmera Self","@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/person\/c8385bc8806cb2d9146ba50fb702e88c"},"headline":"Tokenization and Mobile Payments Security: Part 2 of 2","datePublished":"2018-11-05T14:30:52+00:00","dateModified":"2023-08-11T18:03:13+00:00","mainEntityOfPage":{"@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/"},"wordCount":464,"publisher":{"@id":"https:\/\/innovation.interac.ca\/fr\/#organization"},"articleSection":["Cr\u00e9ation de jetons","Fournisseur de service de jeton Interac"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/","url":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/","name":"Tokenization and Mobile Payments Security: Part 2 of 2 - Innovation Hub","isPartOf":{"@id":"https:\/\/innovation.interac.ca\/fr\/#website"},"datePublished":"2018-11-05T14:30:52+00:00","dateModified":"2023-08-11T18:03:13+00:00","breadcrumb":{"@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/innovation.interac.ca\/fr\/tokenization-and-mobile-payments-security-part-2-of-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/innovation.interac.ca\/fr\/"},{"@type":"ListItem","position":2,"name":"Tokenization and Mobile Payments Security: Part 2 of 2"}]},{"@type":"WebSite","@id":"https:\/\/innovation.interac.ca\/fr\/#website","url":"https:\/\/innovation.interac.ca\/fr\/","name":"Innovation Hub","description":"Innovation Hub","publisher":{"@id":"https:\/\/innovation.interac.ca\/fr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/innovation.interac.ca\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/innovation.interac.ca\/fr\/#organization","name":"Interac","url":"https:\/\/innovation.interac.ca\/fr\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/logo\/image\/","url":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2023\/11\/Interac_TwoColour_RGB.png","contentUrl":"https:\/\/innovation.interac.ca\/wp-content\/uploads\/2023\/11\/Interac_TwoColour_RGB.png","width":2210,"height":2210,"caption":"Interac"},"image":{"@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/interac","https:\/\/x.com\/interac","https:\/\/www.youtube.com\/user\/InteracBrand","https:\/\/www.linkedin.com\/company\/interac-corp\/","https:\/\/www.instagram.com\/interac\/"]},{"@type":"Person","@id":"https:\/\/innovation.interac.ca\/fr\/#\/schema\/person\/c8385bc8806cb2d9146ba50fb702e88c","name":"Kashmera Self","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2f080df3b74416c4cfec8a61242d2943c8d502d884ff70e8866e54f960ba3369?s=96&d=mm&r=g","caption":"Kashmera Self"},"url":"https:\/\/innovation.interac.ca\/fr\/author\/kselfinterac-ca\/"}]}},"_links":{"self":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts\/12554","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/comments?post=12554"}],"version-history":[{"count":0,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts\/12554\/revisions"}],"wp:attachment":[{"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/media?parent=12554"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/categories?post=12554"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/tags?post=12554"},{"taxonomy":"posts_format","embeddable":true,"href":"https:\/\/innovation.interac.ca\/fr\/wp-json\/wp\/v2\/posts_format?post=12554"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}