How to Implement Card Tokenization in 2025: A Comprehensive Guide
Implementing card tokenization in 2025 is straightforward and versatile. It also remains a crucial step to enhance payment security and streamline compliance efforts.
We wrote about 3D Secure (3DS) in a prior blog post, describing what it was and how it’s typically implemented.
As a reminder, 3DS is a security protocol designed to add an extra layer of authentication to card-not-present transactions. Initially introduced by Visa (alongside Celo Communications) in 1999 and subsequently adopted by other major card networks, it aims to reduce fraud by verifying that the individual completing an online payment is indeed the legitimate cardholder. The process typically involves risk-based authentication, one-time passcodes, biometric checks, or other verification methods before the transaction is approved.
While these authentication steps sometimes introduce friction, the goal is to find a balance that prevents illegitimate use of payment cards without unnecessarily disrupting legitimate purchases. Understanding the technical fundamentals behind 3DS can guide better decisions about authentication flows, fraud prevention measures, and user experience optimization. This blog post is intended to help provide that technical understanding for companies looking to evolve their payments stack.
Traditional online card payments rely on static credentials—card number, expiration date, CVV—that can be compromised if exposed. This vulnerability can lead to increased fraud, operational costs from handling chargebacks, and complex disputes. By involving the card issuer in the authentication process, 3DS introduces dynamic, context-based checks to confirm identity. This not only reduces fraudulent activity but also supports compliance efforts with emerging regulatory frameworks that mandate stronger customer authentication (including the actual “Strong Customer Authentication” requirements under Europe’s PSD2). Over time, 3DS has evolved to integrate more subtle and user-friendly verification methods (like frictionless authentication), providing an infrastructure that aligns security with evolving payment expectations.
The name “3D Secure” hints at the underlying mechanics of the protocol. The name comes from the three distinct domains involved in the authentication process:
These three entities coordinate in real-time to authenticate the transaction. The acquirer requests authentication, the issuer validates identity, and the card network provides the secure messaging environment that connects all parties. This differentiates 3DS payment flows from traditional card payment flows, which rely on static credentials—card number, expiration date, CVV—that can be easily exploited if exposed.
3DS traces its roots back to 1999, originating as a Visa product (then under the codename “p42” and designed by Celo Communications). Over time, other major card brands adopted the concept, each under their own branding:
3DS 1.0:The first version introduced a standardized browser redirect flow. It was groundbreaking for its time since it added a security layer that simply didn’t exist before. But it had drawbacks—clunky pop-ups, static passwords, and an inconsistent user experience, often causing shoppers to abandon their carts.
3DS 2.0 and Beyond:Later versions of 3DS leaned into richer data sharing between merchant and issuer and supported mobile and in-app purchases. The goal: minimize friction and reduce the number of times a user must explicitly confirm their identity. The new standards enabled risk-based authentication, allowing many transactions to be authenticated silently in the background.
The 3DS technical standards are set by EMVCo and detailed here [LINK]. If you’re unfamiliar with EMVCo, it’s an industry consortium jointly owned by major payment networks—Visa, Mastercard, American Express, Discover, JCB, and UnionPay. Its primary mission is to facilitate and promote global interoperability and security of payment transactions. Although EMVCo is best known for the EMV chip specifications that govern smart card transactions at physical points of sale, it also oversees various other payment security standards, including 3D-Secure.
It’s also important to distinguish 3DS authentication from the actual payment authorization. They’re two separate processes managed by entirely different systems. 3DS happens first—if required—to establish that the customer is the legitimate cardholder. Only after successful authentication does the normal authorization request occur. (In theory you could perform 3DS after a payment authorization, but it would not provide the same benefits). This decoupling allows for maximum flexibility, with different vendors or infrastructure handling each phase independently.
Below is a step-by-step overview of the 3D Secure flow:
There are important differences between CIT (Customer-Initiated Transaction) vs. MIT (Merchant-Initiated Transaction). A CIT is a purchase started by the cardholder (like checking out in an online store), while an MIT might be a recurring or subscription payment initiated by the merchant without the cardholder’s immediate presence.
A successful 3DS authentication returns data elements like the ECI (Electronic Commerce Indicator) and a cryptogram (CAVV or AAV). These indicate whether liability shifts to the issuer for fraud-related chargebacks and confirm the transaction’s authenticated status. Essentially, authentication says “this cardholder is who they say they are,” while authorization later confirms “they have the funds or credit to cover this purchase.”
Integrating 3DS influences multiple aspects of the payment ecosystem. Fraud management becomes more data-driven, potentially lowering both financial and operational overhead associated with chargebacks. Authentication steps can improve trust, thereby reducing disputes and manual reviews over time. Meanwhile, the technical infrastructure supporting 3DS—APIs, SDKs, and server integrations—must be reliable, scalable, and performant to ensure that verification is both secure and swift.
Continuous monitoring of key metrics, such as authentication times, challenge rates, and fallback scenarios, can inform adjustments in both technology and policy. Over time, optimizing these details helps maintain a stable equilibrium between security, cost-effectiveness, and a smooth checkout experience.
The adoption and enforcement of 3D Secure vary notably across regions, influenced by regulatory mandates, market maturity, and local consumer preferences.
Overall, while the technology underpinning 3DS is global, its rollout and impact are shaped heavily by local factors. Regulatory mandates, market maturity, consumer behavior, and the competitive landscape of payment types all influence how widely and smoothly 3DS is integrated within any given region. Understanding these distinctions can help tailor authentication strategies that align with local expectations and requirements
3DS provides several strategic advantages:
3D Secure is not static. Ongoing refinements are making it more adaptive, leveraging machine learning models, real-time risk intelligence, and biometric technologies. As online transactions continue to rise in volume and variety, 3DS will likely become an increasingly invisible and data-driven layer of protection. Future iterations may offer even tighter integration with tokenization frameworks, automated compliance checks, and cross-channel identity insights.
By understanding the technical underpinnings and operational considerations of 3DS, it’s possible to build a stable authentication framework that meets regulatory standards, mitigates fraudulent activity, and enhances the integrity of online payment operations.
If you're looking to leverage 3D-Secure to improve your payment security, for you and your customers, this session is for you!
Register NowFounder, CEO