We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
PCI compliant documents tokenization process as follows:
tokenization shouldn't be derived from the card info
we can not mathematically speaking, retrieve a pan from its tokenized data
tokeniation does allow for using a cryptography secure function to generate a hash value that can be used as a token for card info
pci strictly forbids storing cvv / cvv2 / or magnetic stripe track info
pci doesn't forbid storing expiration date
pci does forbid storing ipin/ pin/ and other authentication data
However both Stripe and OpenPay allows for storing: PAN, expDate, and CVC
CVV: card verification value AND CVC: card verfication code can be used interchangeable
With that in mind, our PCI compliant noebs vault will be like the following:
/api/tokenize
Response:
In server:
ID =>
Our super secure hash function =>
internal ID (UUID)
It is really tricky.
The text was updated successfully, but these errors were encountered:
implementing tokenization fixing Implement tokenization #85
f41b039
No branches or pull requests
PCI compliant documents tokenization process as follows:
tokenization shouldn't be derived from the card info
we can not mathematically speaking, retrieve a pan from its tokenized data
tokeniation does allow for using a cryptography secure function to generate a hash value that can be used as a token for card info
pci strictly forbids storing cvv / cvv2 / or magnetic stripe track info
pci doesn't forbid storing expiration date
pci does forbid storing ipin/ pin/ and other authentication data
However both Stripe and OpenPay allows for storing: PAN, expDate, and CVC
CVV: card verification value AND CVC: card verfication code can be used interchangeable
With that in mind, our PCI compliant noebs vault will be like the following:
/api/tokenize
Response:
In server:
ID =>
Our super secure hash function =>
internal ID (UUID)
It is really tricky.
The text was updated successfully, but these errors were encountered: