Encryption and Tokenization
Secure Your Data with Encryption and Tokenization
How does it work and what can it do for my business?
You may have heard the terms point to point encryption, end to end encryption, and tokenization and wondered what they mean and whether or not you should care. The short answer is that you should care because they are important tools you may have at your disposal to help protect your business from card data theft and the repercussions of a data breach.
Before we get started let’s ensure that we are speaking the same language by defining a few key terms.
POS system: In this article, “POS” refers to an integrated POS system, meaning that the card data is swiped into the POS through a mag stipe reader and is processed via the POS connection with the payment processor. No stand-alone terminal is used.
Mag Stripe Reader: On the back of every credit card is a “magnetic stripe” that contains the information required to process the credit card transaction. Connected to the integrated POS is a mag stripe reader also known as a “swiper.” The magnetic stripe reader reads the magnetic stripe on the back of the credit card to scan the necessary information into the POS for the processing of the transaction.
Encryption: Encryption is the process of masking critical information with seemingly meaningless information or a code in order to hide the true “meaning” or value of the actual message.
Tokenization: Tokenization is the process of replacing a set of critical information with a substitute of no value or greater ease of use. The “token” used in place of the payment card data is only usable by those parties who hold the payment card data required to actually process the transaction. Otherwise the token is useless.
PCI DSS: Short for Payment Card Industry Data Security Standard, PCI DSS is a set of standards detailing the proper handling of payment card data in the card data environment, which includes the POS, the physical store, and the computer network that the POS is connected to.
Now, that we have defined the vernacular that will be used to describe point to point encryption, let’s begin our discussion.
Point to point encryption, also known as end to end encryption (abbreviated to P2PE and E2E or E2EE respectively,) is the process of encrypting payment card data at the mag stripe reader or “at the point of swipe.” The advantage of P2PE is that the card data does not persist on the POS system. Without P2PE encryption, card data is swiped into the POS through the mag stripe reader in clear text at which point the data is encrypted or d by the POS. There is a split second where the data is not encrypted and that’s all data thieves need.
Another method is to utilize a “token” instead of an encryption. A token allows the transaction to process with non-valuable data instead of full payment card data. Tokens can be used repeatedly for transactions such as monthly billing or adding a tip adjustment to a pre-authorized restaurant transaction.
The worst case scenario when not utilizing P2PE or tokenization is when full card data persists on the POS environment. This creates an opportunity for hackers to access the POS and steal that full and very usable card data to create fraudulent cards. Of course not all POS systems store full card data and there are additional steps that should be taken to secure a POS that does not use P2PE or tokenization. These additional steps are spelled out in the PCI DSS guidelines.
Merchants who do use a P2PE mag stripe reader for their P2PE enabled POS, must still be careful of their physical environment. There are data thieves out there who operate in the physical world as well as cyberspace. Always inspect your card readers to ensure that they have not been tampered with in any way such as the addition of a skimming device. A skimming device can be covertly installed on the mag stripe reader so the data is collected when the card is swiped for payment. Alternately, skimming devices can be carried by fraudulent employees or other persons with access to customer credit cards and are used to secretly collect the card data in addition to swiping the card for payment. In either case, the card data is stored in the skimming device and sold to fraudsters, or used to create counterfeit cards. Skimmed mag stripes can be transferred to another card just like a hotel key card is recoded when you check into a hotel…it’s that easy.
Restaurants are particularly vulnerable to this type of fraud since employees are regularly entrusted with customers’ cards, out of sight of the customer. Your P2PE enabled POS cannot prevent skimming, so it’s up to merchants and their employees to be on the alert for this type of fraud.
P2PE encryption and tokenization are great ways to add security to your payment security strategy. While P2PE and tokenization cannot protect your business from every kind of fraud, they can be very helpful in preventing sensitive data from hanging around.
Vantiv Integrated Payments offers three key solutions to assist with your payment security needs.
- E2E solution (P2PE encryption). Contact your POS system dealer to determine if your POS has P2PE capability through Vantiv Integrated Payments. If so, you may only need a mag stripe reader upgrade in order to utilize the P2PE functionality.
- Tokenization. Vantiv Integrated Payments offers a tokenization POS system integration called MToken®. Again, check with your POS system dealer regarding the availability on your POS.
- Merchant SecureAssist®. Vantiv Integrated Payments offers Merchant SecureAssist, a PCI compliance assistance service to help you ensure that your systems are secure, and comply with PCI DSS.
Contact us for more information or to get started today.
The foregoing is provided for information purposes only, and is not legal advice. You should review your compliance obligations with your own legal or other advisors.
- More Secure Ways To Pay
- Small merchants use tokenization
- What merchants should know
- Merchant cash advance for small business
- What is a merchant cash advance
- Bridging the Gap Part 1: New Customer Expectations
- Bridging The Gap Part 2: Merchant's current reality
- Bridging The Gap Part 3: Digital Commerce
- Breach Report
- Safe and Sound: 4 Tips to Secure Your Business
- Securing the Customer Experience
- Top Five Payment Technologies You Should Not Ignore
- Ways Merchant Can Hurdle Mobility POS Adoption Challenges
- The Time is Now to Develop a Mobile App
- Reasons Consumers Shop Online
- PCI for Retailers
- Loyalty and Payments
- E2E and Tokenization For Your Business
- Avoiding Fraud on your ecommerce site
- The Top 3 Data Breaches of 2014
- Today's Emerging Payments Trends
- EMV: What You Need To Know
- Learn What's New With PCI 3.0
- Integrated Payments and Security
- The Four Levels of PCI Compliance
- PCI Compliance For Restaurants
- POS Security Best Practices
- What does it take to be PCI compliant?
- Beyond cuisine
- What is PCI Compliance
- Article-More repeat business for your restaurant
- Protect Customer Data at the POS
At Your Fingertips
The impending shift in liability for card-present fraud is driving a transition to EMV. Are you ready? This handbook can help you prepare.
Vantiv Integrated Payments is ready for EMV and has the technology and a network of providers that merchants need to enter the new era of payments.