{"id":5422,"date":"2022-11-04T08:27:22","date_gmt":"2022-11-04T08:27:22","guid":{"rendered":"https:\/\/paybis.com\/blog\/?p=5422"},"modified":"2024-04-10T09:01:18","modified_gmt":"2024-04-10T09:01:18","slug":"what-is-payment-tokenization","status":"publish","type":"glossary","link":"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/","title":{"rendered":"Payment Tokenization"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Financial services, particularly retail banking has made significant strides over the years. Since its early beginnings, it has now become a thriving ecosystem with<\/span><a href=\"https:\/\/www.oliverwyman.com\/our-expertise\/insights\/2022\/feb\/would-you-like-better-banking-with-that-latte.html\"><span style=\"font-weight: 400;\"> $400 billion in annual consumer spending<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But with growth come challenges. Retail banking has to deal with many issues, including credit card theft. FTC <\/span><a href=\"https:\/\/www.cnbc.com\/2022\/02\/22\/consumers-lost-5point8-billion-to-fraud-last-year-up-70percent-over-2020.html\"><span style=\"font-weight: 400;\">reports<\/span><\/a><span style=\"font-weight: 400;\"> that credit card fraud led to losses of over $5 billion in 2021 alone.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While most expect the figure to spike in the coming years, blockchain technology seems to offer a solution &#8211; <\/span><b>payment tokenization<\/b><span style=\"font-weight: 400;\">. To this day, the concept has proven to prevent incidents of security breaches by up to 99%. But how exactly does it work? Let\u2019s find out.<\/span><\/p>\n<h1><span style=\"font-weight: 400;\">Tokenization &#8211; The origins of the new era of security in payments<\/span><\/h1>\n<p><span style=\"font-weight: 400;\">To understand the idea behind payment tokenization, it is necessary to understand the concept of tokenization itself. Tokenization is not new and has been around since the dawn of time. A keen example is the exchange of money for chips at a casino or the conversion of funds for tokens at a slot machine.<\/span><\/p>\n<p><picture class=\"attachment-pinterest\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5423\" src=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money.png\" alt=\"tokenized representation of money\" width=\"1999\" height=\"916\" srcset=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money.png 1999w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money-300x137.png 300w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money-1024x469.png 1024w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money-150x69.png 150w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money-768x352.png 768w, https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money-1536x704.png 1536w\" sizes=\"auto, (max-width: 1999px) 100vw, 1999px\" \/><\/picture><\/p>\n<p><b>You give money and receive a tokenized representation of the money. <\/b><span style=\"font-weight: 400;\">This representation can be used for a particular purpose within a particular system.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The general idea behind the concept is simply the substitution of one item to represent another within a particular framework. And this can be applied in different industries.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Tokenization and data security<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">So, what is tokenization when it comes to the privacy of data? In short, it substitutes a sensitive data element with a non-sensitive equivalent, known as a token. This token often has no innate value and with the use of a tokenization system, it maps back to the sensitive data (the actual, real value).<\/span><\/p>\n<p><span style=\"font-weight: 400;\">While tokenization seems foolproof, there are some factors that ensure the safety of sensitive data. The system has to store, authorize, and audit while being isolated from any applications that store sensitive data.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Understanding payment tokenization for card security<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Having established the connection between tokenization and data security, we can now focus on payments. We already explained that tokenization is the process of replacing sensitive data with non-sensitive data. The same rule applies for payment tokenization.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The payments industry leans heavily on the use of credit cards with billions of credit card transactions being settled annually. Alongside the spike in credit card usage, there is the growing threat of bad actors breaching security processes to steal user data. In 2017, a staggering 130,000 credit card fraud was <\/span><a href=\"https:\/\/www.ecb.europa.eu\/pub\/cardfraud\/html\/ecb.cardfraudreport202008~521edb602b.en.html\"><span style=\"font-weight: 400;\">reported<\/span><\/a><span style=\"font-weight: 400;\"> with the same jarring numbers recorded in several jurisdictions globally. To get around this threat, payment tokenization has been touted as a veritable solution.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Payment tokenization explained simply is somewhat difficult. Essentially, it involves using a unique string of numbers or letters (tokens) to replace sensitive customers\u2019 data like a primary account number (PAN), address, and card number.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This token is generated randomly and is often issued in real-time and has no connections to the user accounts. No sensitive data belonging to the user is used in the process. Rather, the token points where the information is being held in the customer&#8217;s bank. Thus, the function of the token apart from masking sensitive data is to access, pass and transmit credit card information between systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Token generation makes use of mathematical algorithms that have proven to be secure and reliable. The implication of this is that, even if, the token falls into the hands of bad actors, there is little they can do to breach user accounts.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">How does it work?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The following step-by-step process explains how to process works.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The first step involves the cardholder kickstarting the process by inputting their credit card data at the Point of Sale.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">This data is received by the merchant bank as a token upon which the merchant bank passed the token to the credit card network seeking authorization.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Upon receiving the authorization, the token is matched to the account number of the cardholder which is stored securely in the bank\u2019s digital vault. This is the standard process used by payment tokenization platforms like <\/span><a href=\"https:\/\/token.io\/\"><span style=\"font-weight: 400;\">Token.io<\/span><\/a><span style=\"font-weight: 400;\">, a comprehensive toolkit for account-to-account payments.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Blockchain applications<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The tokenization of payments eventually transformed into what we now know as cryptocurrency tokens. Essentially, investors use their money to<\/span><b> acquire a digital representation of this money in the form of a token that is limited in number and impossible to copy<\/b><span style=\"font-weight: 400;\">. In time, through product development, marketing, and the eventual increase of demand, the cryptocurrency grows in value.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The same concept is now applied to multiple subsectors of the industry, including NFTs, and <\/span><a href=\"https:\/\/paybis.com\/blog\/gamefi\/\"><span style=\"font-weight: 400;\">GameFi<\/span><\/a><span style=\"font-weight: 400;\">. Essentially, buyers acquire a community-verifiable representation of money, removing the need for government intervention. This, in turn leads to increased privacy and more freedom, which are both benefits we explain bellow.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Benefits of payment tokenization<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">After grasping the tokenization payment meaning and its inner workings, it is important to explore the benefits that it offers to the payments industry and the end user. We start from traditional tokenization and finally discuss blockchain tokenization.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">1. Improved security<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Improving security is one of the most important benefits of using payment tokenization. This stems from the fact that the token is unusable by outside parties. Only the payment processor can read the token, making it a game-changer for internal security measures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is particularly needed given the rising spate of payment fraud in the retail banking ecosystem. Bad actors cause the most havoc after obtaining the personal information of users; this threat is eliminated with tokenized alternatives.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">2. Recurring payments<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Tokenized payments can improve business profitability by allowing the latter to accept recurring payments in a safe environment. Recurring payments are particularly useful in subscription-based services; <\/span><a href=\"https:\/\/blogs.sap.com\/2022\/09\/21\/controlling-recurring-pay-components-appearing-in-one-time-payment\/\"><span style=\"font-weight: 400;\">SAP Insights<\/span><\/a><span style=\"font-weight: 400;\"> predicts that, eventually, over half of all software revenue will come from subscriptions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Users can store their payment details on their favorite platforms, thereby making commercial processes easier for customers. Apart from saving time and allowing for recurring payments, it makes online shopping easier, which is essential in the post-Covid19 global market.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">3. Makes regulatory compliance easier\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">To prevent incidences of credit card fraud, it has become imperative for service providers to impose security standards like the PCI-DSS &#8211;<\/span><a href=\"https:\/\/www.pcisecuritystandards.org\/about_us\/\"><span style=\"font-weight: 400;\"> Payment Card Industry Data Security Standard<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The PCI-DSS requirements impose certain prerequisites for businesses to follow for the protection of sensitive data like the maintenance of a secure network, assigning a unique ID to each person with computer access, and keeping an Information Security Policy.<\/span><span style=\"font-weight: 400;\">To be compliant with the minimum operating requirements, it is necessary for firms to consider tokenization.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">4. Prevent the loss of business revenue<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Adopting tokenized payments insulated companies from a slew of lawsuits from aggrieved customers in the event of a security breach. From a business perspective, this is potentially the most important benefit of a payment network tokenization.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Besides handling customer trouble, businesses can also use the concept to deal with fines from regulatory bodies in their jurisdictions. Oftentimes, these regulatory penalties hover between $5,000 and $100,000. A keen example of a company that faced a difficult patch as a result of non-compliance is the video-conferencing platform Zoom. Zoom was hit with a <\/span><a href=\"https:\/\/www.reuters.com\/technology\/zoom-reaches-85-mln-settlement-lawsuit-over-user-privacy-zoombombing-2021-08-01\/\"><span style=\"font-weight: 400;\">barrage of lawsuits<\/span><\/a><span style=\"font-weight: 400;\"> and eventually had to earmark $85 million to settle the claims of victims.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">5. Improves privacy and freedom (for blockchain tokenization)<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The idea that someone can use a tokenized identity (e.g. ENS name) to go about their day, or buy cryptocurrencies on Paybis for payments, has led to revolutionary developments. You can go about your day in a completely anonymous way.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This is the gift of Web3 and, in this way, it gives power back to the user. It also prevents authorities from cancelling and limiting individuals for subjective purposes. In turn, this leads to increased freedom of speech and open market dynamics.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Difference between tokenization and encryption<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">It is easy to be confused by the terminologies of tokenization and encryption. After all they have both been used to protect sensitive user payment information. However, there is a difference between these terms with each having its pros and cons.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Encryption in data security is the conversion of information into ciphertext, data that is unreadable unless it has been decrypted with authorization. Each digit of the credit card number and other sensitive details are simply replaced with another for security. However, it should be noted that encryption does not prevent interference but it makes it difficult for bad actors to interpret the data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Hackers with sufficient skills and equipment may be able to break into the system and because of this flaw the PCI council considers it \u201csensitive\u201d. However, in transactions where the card is physically present, encryption has been hailed as being one of the best security protocols.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Conversely, there is a general consensus that tokenization provides a higher level of protection in instances when the card is absent. Security experts argue that the best forms of protection might be a combination of both encryption and tokenization methods.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The key difference between both methods is that tokenized data cannot be changed to its original form and tokenization does not use a \u201ckey\u201d to substitute original data. The original, sensitive data never leaves the organization but in encryption, the data leaves but is made unreadable.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Summing up<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Tokenization is the concept of turning data or money into tokens that can be used within specific parameters. They can later be redeemed for their value, all while keeping sensitive information private.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The concept eventually gave rise to the blockchain, which is changing everything we know about privacy, and authority. While currently this is used in the real world, we may see it taking shape into virtual worlds too. The growth of <\/span><a href=\"https:\/\/paybis.com\/blog\/metaverse\/\"><span style=\"font-weight: 400;\">Metaverses<\/span><\/a><span style=\"font-weight: 400;\"> will eventually lead us into a new era of freedom.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Payment tokenization involves using a unique string of numbers or letters (tokens) to replace sensitive customers\u2019 data like a primary account number (PAN), address, and card number<\/p>\n","protected":false},"featured_media":0,"template":"","glossary_letter":[278],"glossary_term":[284,281],"class_list":["post-5422","glossary","type-glossary","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Payment Tokenization Is The Future Of Safety In Finance - Paybis Blog<\/title>\n<meta name=\"description\" content=\"This article will explore the use of payment tokenization as a means of protecting the sensitive data of customers\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Payment Tokenization Is The Future Of Safety In Finance - Paybis Blog\" \/>\n<meta property=\"og:description\" content=\"This article will explore the use of payment tokenization as a means of protecting the sensitive data of customers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/\" \/>\n<meta property=\"og:site_name\" content=\"Paybis Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Paybis\/\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-10T09:01:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@paybis_com\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/\",\"url\":\"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/\",\"name\":\"Payment Tokenization Is The Future Of Safety In Finance - Paybis Blog\",\"isPartOf\":{\"@id\":\"https:\/\/paybis.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money.png\",\"datePublished\":\"2022-11-04T08:27:22+00:00\",\"dateModified\":\"2024-04-10T09:01:18+00:00\",\"description\":\"This article will explore the use of payment tokenization as a means of protecting the sensitive data of customers\",\"breadcrumb\":{\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/#primaryimage\",\"url\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money.png\",\"contentUrl\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money.png\",\"width\":1999,\"height\":916,\"caption\":\"tokenized representation of money\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/paybis.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Glossary\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/paybis.com\/blog\/#website\",\"url\":\"https:\/\/paybis.com\/blog\/\",\"name\":\"Paybis Blog\",\"description\":\"A Tribute to Blockchain Tech and Cryptocurrency Adoption\",\"publisher\":{\"@id\":\"https:\/\/paybis.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/paybis.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/paybis.com\/blog\/#organization\",\"name\":\"Paybis Blog\",\"url\":\"https:\/\/paybis.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png\",\"contentUrl\":\"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png\",\"width\":268,\"height\":72,\"caption\":\"Paybis Blog\"},\"image\":{\"@id\":\"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Paybis\/\",\"https:\/\/x.com\/paybis_com\",\"https:\/\/www.instagram.com\/paybis\/\",\"https:\/\/www.linkedin.com\/company\/paybis-com\",\"https:\/\/www.youtube.com\/c\/Paybis\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Payment Tokenization Is The Future Of Safety In Finance - Paybis Blog","description":"This article will explore the use of payment tokenization as a means of protecting the sensitive data of customers","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/","og_locale":"en_US","og_type":"article","og_title":"Payment Tokenization Is The Future Of Safety In Finance - Paybis Blog","og_description":"This article will explore the use of payment tokenization as a means of protecting the sensitive data of customers","og_url":"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/","og_site_name":"Paybis Blog","article_publisher":"https:\/\/www.facebook.com\/Paybis\/","article_modified_time":"2024-04-10T09:01:18+00:00","og_image":[{"url":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@paybis_com","twitter_misc":{"Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/","url":"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/","name":"Payment Tokenization Is The Future Of Safety In Finance - Paybis Blog","isPartOf":{"@id":"https:\/\/paybis.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/#primaryimage"},"image":{"@id":"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/#primaryimage"},"thumbnailUrl":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money.png","datePublished":"2022-11-04T08:27:22+00:00","dateModified":"2024-04-10T09:01:18+00:00","description":"This article will explore the use of payment tokenization as a means of protecting the sensitive data of customers","breadcrumb":{"@id":"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/#primaryimage","url":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money.png","contentUrl":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2022\/11\/tokenized-representation-of-money.png","width":1999,"height":916,"caption":"tokenized representation of money"},{"@type":"BreadcrumbList","@id":"https:\/\/paybis.com\/blog\/glossary\/what-is-payment-tokenization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/paybis.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Glossary"}]},{"@type":"WebSite","@id":"https:\/\/paybis.com\/blog\/#website","url":"https:\/\/paybis.com\/blog\/","name":"Paybis Blog","description":"A Tribute to Blockchain Tech and Cryptocurrency Adoption","publisher":{"@id":"https:\/\/paybis.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/paybis.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/paybis.com\/blog\/#organization","name":"Paybis Blog","url":"https:\/\/paybis.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png","contentUrl":"https:\/\/paybis.com\/blog\/wp-content\/uploads\/2023\/01\/e60675e736aa42dcba29dde94f4efdf82a001656.png","width":268,"height":72,"caption":"Paybis Blog"},"image":{"@id":"https:\/\/paybis.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Paybis\/","https:\/\/x.com\/paybis_com","https:\/\/www.instagram.com\/paybis\/","https:\/\/www.linkedin.com\/company\/paybis-com","https:\/\/www.youtube.com\/c\/Paybis"]}]}},"_links":{"self":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/glossary\/5422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/glossary"}],"about":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/types\/glossary"}],"wp:attachment":[{"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/media?parent=5422"}],"wp:term":[{"taxonomy":"glossary_letter","embeddable":true,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/glossary_letter?post=5422"},{"taxonomy":"glossary_term","embeddable":true,"href":"https:\/\/paybis.com\/blog\/wp-json\/wp\/v2\/glossary_term?post=5422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}