What is Card Tokenization? How Does Network Tokenization Work?
Card tokenization — the technology powering Apple Pay and Google Pay — is fundamentally transforming payment security by replacing real card numbers with disposable digital tokens. But how exactly does this technology work?
In the world of digital payments, security has always been the top priority. When you tap your phone to pay for a coffee with Apple Pay or complete an online purchase with Google Pay, a technology working behind the scenes is protecting your real card number: Card Tokenization.
What is Tokenization?
Tokenization is the process of replacing sensitive data — such as a card number — with a meaningless, randomly generated string of characters called a token. This token has no mathematical relationship to the original card number; the real data can only be accessed through a mapping table stored in a secure vault (token vault).
In the payments world, there are two primary types of tokenization:
- Payment Gateway / PSP Tokenization: Tokens generated within a payment service provider's own system. These are only valid within that provider's ecosystem.
- Network Tokenization: Tokens generated by card networks such as Visa and Mastercard. These are recognized and usable across the entire ecosystem — issuer, acquirer, and merchant alike.
How Does a Network Token Work?
Network tokenization is built on two key concepts: the Token and the DPAN (Device Primary Account Number).
The process works as follows:
- The cardholder registers their card with a wallet application (Apple Pay, Google Pay, etc.) or a merchant.
- The merchant or wallet sends a token request to a Token Service Provider (TSP) — such as Visa Token Service (VTS) or Mastercard Digital Enablement Service (MDES).
- The TSP generates a 16-digit token (DPAN) to replace the real card number (PAN) and has it approved by the issuing bank.
- The generated token is not tied to the card itself, but bound with restrictions specific to a particular device, channel, or merchant.
- At the point of payment, this token is used instead of the real PAN. The acquirer receives the token, resolves it to the real PAN via the TSP, and the transaction is completed.
The Security Advantage of Tokens: Layers of Restriction
What makes network tokens powerful are the built-in restriction layers:
- Domain Restriction: A token is only valid for a specific merchant, application, or device. Any attempt to use it elsewhere results in a declined transaction.
- Cryptogram: A one-time cryptogram (TAVV/CAVV) is generated for each transaction. Even if the same token is reused, the cryptogram is different — protecting against replay attacks.
- Token Lifecycle Management: Even if a card is lost, expired, or renewed, the token remains valid. The issuing bank updates the PAN-to-token mapping; the merchant or wallet doesn't need to take any action.
Impact on PCI DSS Scope
One of the biggest costs in payment systems is PCI DSS compliance. Since merchants should not store raw card data, tokenization significantly reduces this burden. A merchant using network tokens never sees the real PAN, which narrows the PCI DSS scope — reducing audit costs and security risk alike.
Visa Token Service (VTS) and Mastercard MDES
The two major card brands offer their network tokenization infrastructure under different names:
- Visa Token Service (VTS): Visa's TSP solution. It forms the backbone of services such as Apple Pay, Google Pay, and Click to Pay.
- Mastercard Digital Enablement Service (MDES): Mastercard's equivalent infrastructure, supporting the same ecosystem.
Both services operate in compliance with EMVCo standards and can coexist at a global scale.
The Broader Impact of Network Tokenization on the Payment Ecosystem
This technology doesn't just improve security — it also creates commercial value:
- Higher Authorization Rates: Issuing banks assign a higher trust score to token-based transactions, which increases approval rates.
- Eliminates Card Renewal Friction: When a card is renewed, saved card information at merchants and subscription services is automatically updated — no action required from the user.
- Reduced Fraud: Due to domain restrictions, a stolen token cannot be used in a different environment. Card fraud losses drop significantly.
Conclusion
Card tokenization represents one of the most fundamental paradigm shifts in payment security. By removing the real card number from the payment flow, it protects both the end user and the merchant. Businesses that adopt network token infrastructure gain tangible benefits: higher authorization rates, lower fraud risk, and a simplified PCI compliance scope. The evolution of digital payments in this direction is no longer a prediction — it is a reality already unfolding.