Payment Systems
5 min read

Wallet Tokenization Across Apple/Google/Samsung Pay

Understanding how mobile wallets secure card data through tokenization and how it works across different platforms.

UAM

Uzzam Ahmed Malik

Head of Product – Cards Business

January 8, 2025
Wallet Tokenization Across Apple/Google/Samsung Pay

Wallet Tokenization Across Apple/Google/Samsung Pay

When you add a card to Apple Pay, Google Pay, or Samsung Pay, the actual card number (PAN) never touches the payment terminal. Instead, a token—a surrogate number with no intrinsic value—represents your card. This is payment tokenization, and it's the security foundation of mobile wallets.

Why Tokenization Exists

Traditional card payments expose the PAN at multiple points:

  • On the physical card (embossed or printed)
  • In merchant databases (for card-on-file subscriptions)
  • In transmission to payment processors

A compromised database or intercepted transaction = stolen card credentials = fraud.

Tokenization solves this by de-coupling the payment instrument from its identifier.

How It Works: The Token Lifecycle

1. Card Provisioning (Adding to Wallet)

When you add a Visa to Apple Pay:

  1. Apple collects card details via camera scan or manual entry
  2. Issuer authenticates you (SMS OTP, bank app verification, call center)
  3. Apple requests token from Visa Token Service
  4. Visa generates:
    • DPAN (Device PAN): A 16-digit number that looks like a card number but isn't
    • Cryptographic keys: Unique per device, used to generate transaction-specific codes
  5. Apple stores DPAN and keys in the device Secure Element (tamper-resistant chip)

The original PAN never leaves the issuer's systems. The wallet only knows the DPAN.

2. Transaction Authorization

When you tap to pay:

  1. Wallet generates a one-time cryptogram using:
    • DPAN
    • Transaction amount
    • Device-specific keys
    • Counter (increments with each transaction)
  2. Terminal receives: DPAN + cryptogram (not PAN)
  3. Acquirer routes to card network
  4. Token service (Visa/Mastercard) translates DPAN → PAN
  5. Issuer authorizes using real PAN but only sees DPAN in logs
  6. Approval flows back through the chain

3. Token Lifecycle Management

Tokens aren't permanent:

  • Suspend: User reports phone lost → issuer suspends DPAN via token service → Apple Pay can't transact, but physical card still works
  • Resume: Phone found → issuer resumes DPAN
  • Delete: User removes card from wallet → token permanently deleted
  • Re-tokenize: New device, new DPAN (same physical card can have multiple active tokens)

Platform Differences

Apple Pay

  • Storage: Secure Element (dedicated hardware chip)
  • Authentication: Face ID, Touch ID, or passcode required per transaction
  • Coverage: iPhone, Apple Watch, Mac (with Touch ID), iPad
  • Issuer control: High. Banks must integrate with Apple's APIs and pay fees
  • Offline transactions: Limited support (transit systems via Express Transit)

Google Pay

  • Storage: Host Card Emulation (HCE) or Secure Element (device-dependent)
  • HCE: Tokenization handled in cloud, cryptograms generated server-side
  • Authentication: Device unlock (PIN, fingerprint, face) or per-transaction prompt
  • Coverage: Android phones, Wear OS watches
  • Issuer control: More flexible integration options than Apple
  • Offline: Rare, primarily cloud-connected

Samsung Pay

  • Storage: Secure Element (Knox-protected)
  • Authentication: Fingerprint, iris scan, or PIN
  • Unique feature: MST (Magnetic Secure Transmission) emulates a mag-stripe card swipe—works at non-NFC terminals (being phased out)
  • Coverage: Samsung Galaxy devices
  • Issuer control: Similar to Apple Pay, requires direct partnership

Token Domains

Not all tokens work everywhere. EMVCo defines token domains:

  • Contactless (NFC): Tap-to-pay at physical terminals
  • E-commerce: Online transactions (rare, mostly card-on-file uses different token types)
  • In-app: Payments within mobile apps using wallet SDKs

An Apple Pay DPAN provisioned for contactless won't work for e-commerce. Each domain requires separate tokenization.

Security Advantages

1. Merchant Breach Immunity

If a retailer's database is compromised, attackers get DPANs—useless without:

  • Device-specific cryptographic keys (stored in Secure Element)
  • Biometric authentication to unlock wallet
  • Proximity to NFC terminal (can't replay online)

2. No Static CVV

Physical cards have a static CVV2 printed on the back. DPAN transactions use dynamic CVVs—the cryptogram changes every transaction. Replay attacks fail.

3. Device Binding

Each token is tied to a specific device's Secure Element. Cloning the DPAN to another device doesn't work—the cryptographic keys don't transfer.

4. Granular Control

Issuer can suspend a token without blocking the physical card. User switches phones → old token deleted, new one provisioned, no new plastic needed.

Challenges and Limitations

Issuer Integration Complexity

Supporting wallets requires:

  • Token Service Provider (TSP) integration: Visa Token Service, Mastercard MDES
  • Cardholder verification: SMS, app-based auth, call centers
  • Real-time provisioning APIs: Approve/decline token requests in <5 seconds
  • Lifecycle management: Sync suspend/resume/delete events

Smaller issuers often outsource this to processors.

Cross-Platform Fragmentation

A cardholder with both iPhone and Samsung has two separate DPANs for the same card. Fraud patterns and spending limits must account for multi-device scenarios.

Limited Merchant Acceptance

Tokenized NFC payments require:

  • Contactless-enabled terminals
  • Processor support for cryptogram validation

Not universal, especially in cash-heavy or legacy-infrastructure markets.

Offline Transaction Constraints

Cryptogram generation typically requires network connectivity. Transit systems using Express Transit pre-load a limited number of offline cryptograms, but this isn't scalable for general retail.

The Future: Cloud-Based Wallets

Emerging trend: cloud tokens instead of device-bound ones. Benefits:

  • User switches phones → no re-provisioning, same token follows
  • Multi-device sync (pay with phone, watch, laptop using same DPAN)
  • Easier fraud detection (single token view across devices)

Tradeoff: Security moves from hardware (Secure Element) to cloud HSMs (Hardware Security Modules). More convenient, slightly higher remote attack surface.

Key Takeaways

  • Tokenization replaces card numbers with device-specific surrogates
  • DPANs are worthless without the device's cryptographic keys
  • Each wallet platform (Apple, Google, Samsung) has unique architectures
  • Issuers must integrate with token service providers and handle provisioning
  • Security gains are significant: breach immunity, dynamic CVVs, granular control
  • Future is cloud-native, cross-device token portability

Payment tokenization is why mobile wallets are safer than plastic cards. The physical card is the legacy liability; the token is the secure future.

tokenization
digital wallets
Apple Pay
Google Pay
security

Related Articles