Wallet Tokenization Across Apple/Google/Samsung Pay
Understanding how mobile wallets secure card data through tokenization and how it works across different platforms.
Uzzam Ahmed Malik
Head of Product – Cards Business

Wallet Tokenization Across Apple/Google/Samsung Pay
When you add a card to Apple Pay, Google Pay, or Samsung Pay, the actual card number (PAN) never touches the payment terminal. Instead, a token—a surrogate number with no intrinsic value—represents your card. This is payment tokenization, and it's the security foundation of mobile wallets.
Why Tokenization Exists
Traditional card payments expose the PAN at multiple points:
- On the physical card (embossed or printed)
- In merchant databases (for card-on-file subscriptions)
- In transmission to payment processors
A compromised database or intercepted transaction = stolen card credentials = fraud.
Tokenization solves this by de-coupling the payment instrument from its identifier.
How It Works: The Token Lifecycle
1. Card Provisioning (Adding to Wallet)
When you add a Visa to Apple Pay:
- Apple collects card details via camera scan or manual entry
- Issuer authenticates you (SMS OTP, bank app verification, call center)
- Apple requests token from Visa Token Service
- Visa generates:
- DPAN (Device PAN): A 16-digit number that looks like a card number but isn't
- Cryptographic keys: Unique per device, used to generate transaction-specific codes
- Apple stores DPAN and keys in the device Secure Element (tamper-resistant chip)
The original PAN never leaves the issuer's systems. The wallet only knows the DPAN.
2. Transaction Authorization
When you tap to pay:
- Wallet generates a one-time cryptogram using:
- DPAN
- Transaction amount
- Device-specific keys
- Counter (increments with each transaction)
- Terminal receives: DPAN + cryptogram (not PAN)
- Acquirer routes to card network
- Token service (Visa/Mastercard) translates DPAN → PAN
- Issuer authorizes using real PAN but only sees DPAN in logs
- Approval flows back through the chain
3. Token Lifecycle Management
Tokens aren't permanent:
- Suspend: User reports phone lost → issuer suspends DPAN via token service → Apple Pay can't transact, but physical card still works
- Resume: Phone found → issuer resumes DPAN
- Delete: User removes card from wallet → token permanently deleted
- Re-tokenize: New device, new DPAN (same physical card can have multiple active tokens)
Platform Differences
Apple Pay
- Storage: Secure Element (dedicated hardware chip)
- Authentication: Face ID, Touch ID, or passcode required per transaction
- Coverage: iPhone, Apple Watch, Mac (with Touch ID), iPad
- Issuer control: High. Banks must integrate with Apple's APIs and pay fees
- Offline transactions: Limited support (transit systems via Express Transit)
Google Pay
- Storage: Host Card Emulation (HCE) or Secure Element (device-dependent)
- HCE: Tokenization handled in cloud, cryptograms generated server-side
- Authentication: Device unlock (PIN, fingerprint, face) or per-transaction prompt
- Coverage: Android phones, Wear OS watches
- Issuer control: More flexible integration options than Apple
- Offline: Rare, primarily cloud-connected
Samsung Pay
- Storage: Secure Element (Knox-protected)
- Authentication: Fingerprint, iris scan, or PIN
- Unique feature: MST (Magnetic Secure Transmission) emulates a mag-stripe card swipe—works at non-NFC terminals (being phased out)
- Coverage: Samsung Galaxy devices
- Issuer control: Similar to Apple Pay, requires direct partnership
Token Domains
Not all tokens work everywhere. EMVCo defines token domains:
- Contactless (NFC): Tap-to-pay at physical terminals
- E-commerce: Online transactions (rare, mostly card-on-file uses different token types)
- In-app: Payments within mobile apps using wallet SDKs
An Apple Pay DPAN provisioned for contactless won't work for e-commerce. Each domain requires separate tokenization.
Security Advantages
1. Merchant Breach Immunity
If a retailer's database is compromised, attackers get DPANs—useless without:
- Device-specific cryptographic keys (stored in Secure Element)
- Biometric authentication to unlock wallet
- Proximity to NFC terminal (can't replay online)
2. No Static CVV
Physical cards have a static CVV2 printed on the back. DPAN transactions use dynamic CVVs—the cryptogram changes every transaction. Replay attacks fail.
3. Device Binding
Each token is tied to a specific device's Secure Element. Cloning the DPAN to another device doesn't work—the cryptographic keys don't transfer.
4. Granular Control
Issuer can suspend a token without blocking the physical card. User switches phones → old token deleted, new one provisioned, no new plastic needed.
Challenges and Limitations
Issuer Integration Complexity
Supporting wallets requires:
- Token Service Provider (TSP) integration: Visa Token Service, Mastercard MDES
- Cardholder verification: SMS, app-based auth, call centers
- Real-time provisioning APIs: Approve/decline token requests in <5 seconds
- Lifecycle management: Sync suspend/resume/delete events
Smaller issuers often outsource this to processors.
Cross-Platform Fragmentation
A cardholder with both iPhone and Samsung has two separate DPANs for the same card. Fraud patterns and spending limits must account for multi-device scenarios.
Limited Merchant Acceptance
Tokenized NFC payments require:
- Contactless-enabled terminals
- Processor support for cryptogram validation
Not universal, especially in cash-heavy or legacy-infrastructure markets.
Offline Transaction Constraints
Cryptogram generation typically requires network connectivity. Transit systems using Express Transit pre-load a limited number of offline cryptograms, but this isn't scalable for general retail.
The Future: Cloud-Based Wallets
Emerging trend: cloud tokens instead of device-bound ones. Benefits:
- User switches phones → no re-provisioning, same token follows
- Multi-device sync (pay with phone, watch, laptop using same DPAN)
- Easier fraud detection (single token view across devices)
Tradeoff: Security moves from hardware (Secure Element) to cloud HSMs (Hardware Security Modules). More convenient, slightly higher remote attack surface.
Key Takeaways
- Tokenization replaces card numbers with device-specific surrogates
- DPANs are worthless without the device's cryptographic keys
- Each wallet platform (Apple, Google, Samsung) has unique architectures
- Issuers must integrate with token service providers and handle provisioning
- Security gains are significant: breach immunity, dynamic CVVs, granular control
- Future is cloud-native, cross-device token portability
Payment tokenization is why mobile wallets are safer than plastic cards. The physical card is the legacy liability; the token is the secure future.


