As you explore the world of merchant tokenization, you may frequently come across three seemingly interchangeable terms: acquiring tokens, issuer tokens, and payment tokens. Each of these tokens works in a relatively similar way, replacing a primary account number with an alternative value. However, these tokens all originate in different places and can have slight differences. Here’s how the Payment Card Industry defines each:
Acquiring Tokens
Acquiring tokens are created by the acquirer, merchant, or a merchant’s service provider after the cardholder presents their PAN and/or other payment credentials. These tokens are not subject to any industry standards for generation, formatting, or provisioning.
Acquiring tokens cannot be used for new authorizations. They can be used for card-on-file and recurring payments.
Issuer Tokens (Virtual Card Numbers)
Issuer tokens are created by credit card issuers (Visa, Mastercard, Discover, or American Express.) These tokens have a much more limited scope of use.
Make Payment Security Much Less Confusing
At Curbstone, we know just how complicated payment tokenization – or anything related to data security – can be. That’s why we make the process easy for our merchants. We focus on the technical specifications and complicated annual audits, while customers get to focus on what they do best: running their own business. To learn more about secure, integrated credit and debit card processing, contact us today.
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.