Global | Change

Credit Card Data
Encryption & Tokenization

Leading Technology for Payment Security

Credit Card Data<br>Encryption & Tokenization

Comprehensive End-to-End Encryption and Tokenization Solution

By combining end-to-end encryption (E2EE) and data tokenization, our solution addresses the root cause of data theft by removing cardholder data from the retail environment.

Expertise

With our security partners, we deploy complex merchant-and-processor infrastructure worldwide, giving our customers the long-term security vision demanded by today’s dynamic payments environment.

Proven Solution

Experts agree that solutions like our Tamper-Resistant Security Module-based (TRSM) E2EE solution require minimal infrastructure changes. Verifone offers the only proven tokenization security architecture currently used in significant processor/acquirer environments.


Encryption & Tokenization

Encryption

Based on AESCustomer’s account data is encrypted at the point of interaction based on Advanced Encryption Standard (AES).
Multiple DevicesAvailable in most Verifone POS and mobile payment devices, including PIN pads, countertop, multimedia and PAYware Mobile Enterprise.
Multiple TypesSecure data regardless of the payment type: mag-stripe, EMV or NFC.
AsymmetricAsymmetric encryption (PKI) perfectly suited for remote deployment to large numbers of existing terminals.

Decryption

Single InfrastructureProvides POS infrastructure flexibility for both merchants and processors.
Trusted PartnerEncrypted data remains secure all the way to the processor, where it is decrypted and sent to the issuer for approval.

Tokenization

Substitution of PANTrue random number data tokenization. No algorithm is required to reverse engineer your credit card tokenization solution.
Data1:1 credit card tokenization mapping for merchants means the same card always returns same token for chargebacks and to enable analytics.
FormatOur payment tokenization preserves the original transaction format for seamless integration with existing systems.

Monitoring and Compliance

MonitoringMonitor the encryption status of every transaction on every device in real-time.
AlertsImmediate notification of changes to your POS status, location or compliance level.
Merchant RetentionImprove relationships with merchants thanks to instant notification of changes to POS status.