Payment Tokenisation Explained

Payment Tokenisation Explained

This guide provides a technical and practical look at how tokenisation works within modern payment systems. We cover the differences between tokens and primary account numbers, the role of network providers, and the impact on security and compliance.

Digital payment volumes continue to climb as consumers move away from physical cash and towards mobile-first solutions. This growth brings intense security pressure for businesses that must handle sensitive card data while facing sophisticated fraud attempts. Protecting this information has become a fundamental requirement for staying operational. Payment tokenisation provides a robust answer by swapping vulnerable card details for secure alternatives, allowing for safer transactions without extra risk.

What is payment tokenisation?

Payment tokenisation replaces sensitive card data with a non-sensitive token that cannot be used outside a defined context.

At its core, this process removes the primary account number (PAN) from the transaction environment. Instead of a merchant storing a sixteen-digit card number, they store a randomly generated string of characters known as a token. This token acts as a placeholder. If a database is ever accessed by an unauthorised party, the stolen tokens are useless to them. They have no value on their own and cannot be used to make purchases elsewhere.

Think of it like a cloakroom ticket. When you leave your coat at a theatre, the attendant gives you a small slip of paper with a number on it. That ticket is not your coat, and it has no value to anyone else. However, within that specific theatre, that ticket is the only thing that can retrieve your garment. In payments, the token is that ticket, and the card details are the coat safely locked away in a secure vault.

How does payment tokenisation work?

The process moves card data through a secure vault where it is swapped for a token that the merchant then uses for future transactions.

The flow begins when a customer enters their card details at the point of sale. Instead of these details staying on the merchant’s server, they are sent directly to a payment service provider (PSP) or a dedicated token vault. The vault stores the original data and generates a unique token in its place. This token is sent back to the merchant for their records. For any recurring billing or one-click purchases, the merchant only ever sends the token to the PSP, who then matches it back to the real card for processing.

Transaction stageNon-tokenised flowTokenised flow
Data entryCardholder enters PANCardholder enters PAN
Data storageMerchant stores encrypted PANMerchant stores non-sensitive token
Recurring billingMerchant sends PAN to processorMerchant sends token to processor
Data breach riskHigh: PAN is exposedLow: Token is useless to hackers
PCI complianceBroad scope, high costNarrow scope, lower cost

Why is tokenisation used in payments?

It is used to protect sensitive data from breaches, simplify regulatory compliance, and improve the overall security of the payments sector.

Fraud remains a significant problem for the UK economy. According to the UK Finance Half Year Fraud Report 2025, card-not-present fraud cases rose 22% in the first half of 2025 alone, with card fraud losses reaching £299 million in just six months — highlighting the need for better data protection at the point of storage.

Paul Munson, UK CCO and MLRO at Wallester, notes that an investigative mindset is essential for staying ahead of these figures. He points out that fraud accounts for roughly40% of all reported crime in the UK. By hardening the payment infrastructure through tokenisation, businesses make the harvesting of card data unprofitable. This forces criminals away from automated database exploits and into more difficult, manual social engineering methods.

Lowering the administrative burden of PCI DSS compliance is another major driver. When a business does not store or process raw card data, the number of security controls they must satisfy drops. This makes the audit process faster and cheaper. Furthermore, it creates a better experience for the customer. Since their real card details are not sitting in multiple merchant databases, the risk of their card being skimmed or stolen digitally is greatly lowered.

Q&A: Can tokenisation prevent fraud completely?

No. While it makes card data theft much more difficult, it does not stop all types of fraud. Criminals might still use social engineering or account takeover methods to make purchases. It protects the data at rest but cannot account for the actions of a compromised user.

Further Reading: Tokenisation: How Virtual Cards Protect Payment Data

Is tokenisation the same as encryption?

No, encryption hides data using a mathematical key that can be reversed, while tokenisation replaces data with a placeholder that has no mathematical link to the original.

Encryption uses an algorithm to scramble information into ciphertext. Anyone with the correct key can turn that ciphertext back into the original data. This is useful for sending data across the internet safely. Tokenisation, however, does not use a key to unlock the original number. The relationship between the token and the PAN is stored in a secure database (the vault). There is no way to work out the card number just by looking at the token.

FeatureEncryptionTokenisation
Underlying logicMathematical algorithmDatabase mapping
ReversibilityReversible with a keyOnly reversible via the vault
Data formatOften changes formatCan keep the same format
Security focusData in transitData at rest
PCI impactData is still in scopeRemoves data from scope

Where is payment tokenisation used today?

It is the foundation for mobile wallets like Apple Pay and Google Pay, as well as e-commerce subscriptions and card-on-file services.

When you add a card to Apple Pay or Google Pay, the wallet provider does not store your actual card number on your phone. Instead, they request a token (often called a Device Account Number) from the bank. When you pay at a shop, your phone sends this token. Even if someone intercepts the signal, they cannot find your real card details.

E-commerce sites also use this for subscription billing. When you sign up for a streaming service, they keep a token on file. This allows them to charge you every month without ever holding your sensitive details. This also applies to one-click checkouts on major retail platforms. The convenience of not entering your card every time is made possible by secure token storage.

What is network tokenisation and how is it different?

Network tokenisation is provided directly by card networks like Visa and Mastercard, offering a more permanent and smarter alternative to standard PSP tokens.

Standard tokens are usually specific to one payment processor. If you move your business to a different processor, those tokens often become useless. Network tokens, issued by Visa or Mastercard, stay valid across the entire payment ecosystem. They also have lifecycle management features. If a customer’s card expires or is lost, the network can automatically update the token with the new card details.

This means the merchant does not have to ask the customer to update their card information manually. It leads to fewer declined transactions and a smoother experience. Issuing banks grant higher approval rates for these tokens, as data coming directly from the source carries a much higher trust level than standard entries.

Q&A: Do network tokens expire?

Usually, they stay active as long as the underlying card account is open. If the physical card is replaced due to expiry, the token is updated in the background, making it far more persistent than a standard merchant-level token.

What are the limitations of payment tokenisation?

The main drawbacks include a heavy dependency on the token vault provider and the potential complexity of integrating the system with existing hardware.

If a merchant relies on a specific PSP for their tokens, they might find themselves locked in to that provider. Moving thousands of stored tokens to a new service is a difficult technical task. There is also the matter of cost. While tokenisation saves money on compliance and fraud, providers often charge a small fee per token or per transaction for the service.

There are also some interoperability issues. A token generated for an online transaction might not work if the customer tries to use it for an in-person return at a physical shop. These technical hurdles require careful planning during the implementation phase to make sure the customer journey remains fluid.

How do businesses implement tokenisation?

Implementation is usually handled through a payment service provider’s API or by using hardware-level integration for physical stores.

Most modern businesses do not build their own token vaults because the security requirements are too high. Instead, they use a partner that is already PCI-certified. The process involves a few key steps:

  1. Selecting a provider that supports both merchant and network tokens.
  2. Integrating the provider’s API into the checkout flow to capture data.
  3. Replacing any existing card-on-file data with secure tokens.
  4. Setting up a system to handle token updates from the card networks.
  5. Updating internal databases to store tokens instead of PANs.
  6. Testing the flow to guarantee that tokens are correctly mapped to customer IDs.

How Wallester supports tokenised payments

Wallester provides the technical infrastructure required for businesses to issue and manage cards that are fully compatible with modern tokenisation standards. The platform is built for companies that need virtual cards for internal spending, media buying, or customer-facing fintech products. By using an API-first approach, they allow for the quick creation of cards that work with major mobile wallets.

The system is designed to handle the complexities of token issuance and lifecycle management without the merchant needing to manage a secure vault themselves. This makes it easier for SaaS providers and fintech founders to launch card programmes that are secure by design. Teams working with high transaction volumes often look for ways to handle card data without storing it directly. Solutions like Wallester provide that layer.

FAQ

Is tokenisation required for PCI compliance?

It is not strictly mandatory, but it is highly recommended as a way to simplify the process. When you use tokens, you remove the actual card data from your systems. This means you have fewer security rules to follow, which makes your annual compliance check much faster and cheaper. Most businesses find that it is the most efficient way to meet the strict standards required by the payments industry today.

Can tokens be reused across different merchants?

Usually, no. Most payment tokens are merchant-specific. This means a token generated for one shop will not work if it is stolen and tried at another. This is a core security feature of the technology. It guarantees that even if a criminal manages to get hold of a token database, they cannot use those character strings to make purchases elsewhere on the internet. It limits the blast radius of any potential data leak.

What happens if a token is stolen by a hacker?

If a hacker steals a token, they essentially have a piece of useless data. As tokens are mapped to specific merchants or devices, they cannot be used to authorise new payments in a different context. The vault that holds the map between the token and the real card number remains secure. This is the primary reason why tokenisation is superior to traditional data storage; it renders the stolen information valueless for any further criminal activity.

Does tokenisation work for bank transfers and SEPA?

No, tokenisation is a technology specifically designed for the card payment ecosystem. Bank transfers, such as those made through the SEPA or BACS systems, rely on different security protocols like IBAN validation and strong customer authentication (SCA). While there are similar concepts in open banking where sensitive account access is granted via tokens, the payment tokenisation discussed here is almost exclusively used for credit, debit, and prepaid card transactions.

Are payment tokens permanent?

They can be, but they don’t have to be. Network tokens are designed to last for the life of the card account, even if the physical card is replaced. However, some systems use single-use tokens for one-off transactions. These disappear as soon as the payment is processed. For subscription-based businesses, permanent tokens are the standard choice because they allow for recurring billing without requiring the customer to re-enter their card details every single month.

Related Articles

Please, improve your experience!

You’re using an unsupported web browser. As Wallester supports the latest versions, we highly recommend you use an up-to-date version of one of these browsers:

Chrome
Download
Firefox
Download
Safari
Download
Opera
Download
Edge
Download