This article details the mechanics of dynamic CVV technology, its three primary deployment methods, and its effectiveness against Card-Not-Present (CNP) fraud. It includes a technical comparison with 3D Secure and tokenisation, alongside specific adoption considerations for issuers, merchants, and B2B buyers managing digital payments in 2026.
Static payment data presents an ongoing operational risk for modern financial institutions. Criminals actively target permanent security codes to bypass standard authentication frameworks and execute remote fraud. In response, issuers are deploying dynamic CVV technology. This system replaces printed three-digit codes with algorithmically generated, time-sensitive credentials. By invalidating stolen data within minutes, rotating codes directly addresses the primary vector for digital payment fraud across both major retail and corporate networks.
What is a dynamic CVV?
A dynamic CVV (also called a rotating CVV or dCVV) is a 3-digit security code that regenerates automatically at set intervals, replacing the static code printed on traditional payment cards.
For financial institutions and enterprise procurement teams looking to secure digital transactions, dynamic CVV technology represents a foundational shift in real-time payment validation.
Key terms glossary
- CVV: Card Verification Value. The standard security code used to verify possession of a payment card.
- dCVV / dCVV2: Industry shorthand for dynamic CVV.
- CNP Fraud: Card-Not-Present fraud. Fraudulent transactions made remotely without the physical card.
Introduced in the mid-1990s, the static Card Verification Value (CVV) was originally designed to prove physical possession of a card during internet and telephone transactions. However, this static nature has become its most critical vulnerability; once intercepted by malicious actors, the code remains valid indefinitely. Modern network-level implementations, most notably Visa dCVV2 and Mastercard dynamic code, resolve this vulnerability by rendering stolen credentials completely useless almost instantly. By constantly refreshing the validation data, this technology significantly eases the burden of maintaining Payment Card Industry Data Security Standard (PCI DSS) compliance for issuers and merchants alike.
Further Reading: How Virtual Card Technology Works
Why static CVV codes are no longer enough
Global card fraud losses reached $33.41B in 2024, down slightly from the 2023 peak of $33.83B, but remaining an acute threat to the global financial system, according to the Nilson Report (2025). Concurrently, the Federal Trade Commission’s 2024 Data Book noted that U.S. consumers reported over $12.5B in total fraud losses, representing a severe 25% year-over-year jump. This ongoing financial haemorrhage is driven largely by massive database breaches, highly sophisticated phishing campaigns, and organised digital fraud rings utilising automated Magecart scripts to skim checkout pages.
When a static CVV is stolen alongside a Primary Account Number (PAN), fraudsters gain indefinite, unrestricted access to the associated account. There is no automated expiry or invalidation mechanism for a static code, short of the issuer entirely cancelling and replacing the physical card.
By contrast, a stolen dynamic CVV is worthless within minutes. Even if malicious actors harvest a one-time CVV via malware or a breached merchant gateway, the brief validity window prevents them from monetising the data on the dark web. With global card fraud losses projected to hit $43B by the end of 2026, moving away from static validation is a critical security imperative.
How does a rotating CVV work?
The technical architecture of a rotating CVV relies on perfectly synchronised cryptography between the issuing bank (or the major card network) and the user’s interface. Instead of relying on a hardcoded value, the system algorithmically calculates a new security code based on specific, time-bound mathematical parameters.
Similar to how Google Authenticator rotates access codes for software logins, this process happens invisibly in the background.
- Input data assembly: The algorithm collects the card’s Primary Account Number, the current exact timestamp (or a synchronised transaction-specific counter), and the issuer’s highly secure private secret key.
- Cryptographic processing: These inputs are processed using advanced encryption standards. While legacy payment architectures often relied on 3DES encryption, modern API integrations and software development kits (SDKs) heavily favour AES cryptography. AES encryption provides superior payload efficiency, faster cloud processing speeds, and stronger resistance against brute-force computational attacks.
- Output truncation: The resulting cryptographic hash from the AES processing is long and complex. The algorithm truncates this output down to a standard 3-digit or 4-digit sequence. This truncated sequence becomes the dynamic CVV presented to the user.
- Time-based rotation: A new code is generated automatically at predefined intervals, usually every 1 to 60 minutes. This rotation interval is highly issuer-configurable, allowing banks to balance their specific security risk tolerance with their backend server processing capabilities.
- Network validation: During the e-commerce checkout process, the card network validates the authorisation request. The network utilises the same algorithm and synchronised clock to verify that the submitted rotating CVV matches the expected mathematical value for that specific millisecond.

Delivery methods for dynamic CVV
Issuers can deploy dynamic CVV technology through several distinct channels, ranging from digital-first mobile interfaces to highly specialised physical hardware. The focus in 2026 has shifted toward digital delivery to support the massive expansion of commercial virtual cards.
Digital wallets & mobile banking apps
The dominant and most scalable deployment method involves the user opening their mobile banking app or corporate digital wallet to view a mobile banking app CVV. This approach requires absolutely no physical hardware changes; that’s why it is the most cost-effective strategy for large issuers. Network-level services, such as the Visa dCVV2 Generate protocol, allow banks to quickly deploy this capability directly into their existing consumer and corporate digital banking environments.
API / browser extensions
For complex enterprise use cases, secure API integrations and managed browser extensions handle the code generation automatically. Enterprise resource planning (ERP) and procurement platforms can fetch a rotating CVV directly at the point of checkout for B2B vendor payments. This frictionless, invisible integration streamlines operations for accounts payable teams while highly securing large corporate transactions against interception.
E-ink physical cards
For environments where physical media is still required, specialised cards feature an embedded e-ink display on the back plastic. A microscopic internal chip and an ultra-thin battery update the visual code on the card surface every 30 to 60 minutes. While technologically impressive, the high manufacturing costs make e-ink cards a premium portfolio option rather than a standard, fleet-wide deployment method.
Further Reading: Tokenisation: How Virtual Cards Protect Payment Data
Dynamic CVV vs. 3D Secure vs. tokenisation
Modern payment fraud prevention demands a multi-layered, defence-in-depth approach. Product managers need to understand how dynamic CVV fits into the broader payment ecosystem alongside 3D Secure 2.0 and network tokenisation. In regions strictly governed by European PSD2 and Strong Customer Authentication (SCA) mandates, issuers routinely deploy these overlapping technologies in tandem to guarantee compliance and maximise approval rates.
| Technology | How it works | Primary threat addressed | User friction | Merchant integration required |
| Dynamic CVV | Algorithmically generates a new 3-digit code at set intervals. | Card-Not-Present (CNP) fraud. | Minimal (app generation) to none (B2B API). | None (uses standard payment fields). |
| 3D Secure 2.0 | Uses risk-based background authentication and biometric user redirects. | Unauthorised transaction execution. | Moderate (often causes cart abandonment). | Yes (requires 3DS protocol implementation). |
| Tokenisation | Replaces the actual PAN with a secure, merchant-specific digital token. | Mass data breach exposure. | Invisible to the user. | Yes (requires network token APIs). |
These security protocols are entirely complementary, not competing. The current industry best practice is to combine dynamic CVV with network tokenisation. As a result, neither the primary account number nor the validation code can be effectively weaponised by bad actors if a database is breached.
Benefits for issuers, merchants, and B2B buyers
The adoption of rotating security codes provides highly measurable operational and financial advantages across the entire digital payment value chain.
For card issuers, the primary benefit is an immediate reduction in fraud liability and operational overhead. Banks save millions in logistical costs associated with plastic card reissuance following major retailer data breaches. Offering this visible security feature also grants issuers a strong top-of-wallet positioning advantage among security-conscious clients.
Merchants benefit heavily through a direct reduction in costly chargebacks and complex dispute resolution overhead. Unlike 3D Secure 2.0, which can introduce frustrating checkout friction and trigger cart abandonment, dynamic codes utilise existing standard payment fields.
Dynamic CVV protects high-value corporate virtual cards used extensively for B2B buyers and vendor procurement. The B2B sector currently dominates the virtual card space. According toJuniper Research, B2B spending drives the vast majority of virtual card transaction value, propelling a total global market projected to reach a staggering $17.4 trillion by 2029.
Limitations and challenges to watch
While highly effective at neutralising specific attack vectors, rotating codes are not a panacea for all payment vulnerabilities. Digital banking leaders must weigh a few key limitations during implementation.
First, there is minor UX friction associated with consumer app-based flows. Requiring retail buyers to unlock their phone and open a banking application to retrieve a code adds an undeniable step to the checkout flow, which can frustrate users conditioned to seamless purchasing.
Second, regarding the overall security scope, dynamic codes strictly address CNP fraud by invalidating the three-digit security field. However, the PAN itself can still be exposed during a plain-text database breach. If network tokenisation is not implemented alongside the rotating CVV, the exposed PAN remains vulnerable to automated bin-attack testing.
Finally, recurring billing ecosystems present a unique operational challenge. Subscriptions that store a card-on-file using a static CVV require specialised issuer handling. Payment processors must properly flag these recurring charges as merchant-initiated transactions (MIT) to prevent chronic authorisation failures when the initial dynamic code inevitably expires.


