How tokenization and encryption work together

Card-present transactions

  • true

    Customer’s card data is encrypted and formatted at the point of sale.

  • true

    An algorithm reformats the data so the POS system processes it in the same manner as previously unencrypted data.

  • true

    Encrypted data is transmitted to our system, decrypted and processed through the payment brand networks.

  • true

    We reply with a token for future use.

Card-not-present transactions

  • true

    Customer purchases from your website.

  • true

    Data encrypted within your website.

  • true

    Our server decrypts card data to process payment.

  • true

    We reply with a token for future use.


Key Benefits

  • Help protect customer payment data from fraud both within and outside your network.
  • Reduce the risk of card data exposure in the event of a data breach.
  • Minimize the impact of Payment Card Industry (PCI) scope by not storing and transmitting cardholder data.
  • Maintain business processes that rely on cardholder data.

Related Insights

Unlock the power of Hosted Payment solutions

Learn how we deliver exceptional security for eCommerce by contacting your J.P. Morgan representative today.