
Transaction Authentication Number (TAN)
A transaction authentication number is a one-time code used in the processing of online transactions. A transaction authorization number (TAN) represents an additional layer of security beyond a password to securely log into an account or conduct a transaction. It is advised, for instance, that email users sign in to their email accounts using two-factor authentication, whereby one must put one’s password in along with a transaction authentication number. Organizations such as the Payment Card Industry Security Standards Council create standards that payment card acquirers and processing companies are expected to follow in order to encrypt card information at the point-of-interaction (POI) and later decrypt and process the transaction. The first level of authentication may include a personal identification number (PIN) or password to access an account, while the second level of authentication may be the TAN.
What is a Transaction Authentication Number (TAN)
A transaction authentication number is a one-time code used in the processing of online transactions. A transaction authorization number (TAN) represents an additional layer of security beyond a password to securely log into an account or conduct a transaction.
BREAKING DOWN Transaction Authentication Number (TAN)
Transaction authentication numbers (TANs) provide extra security. Merchants and payment card companies have an incentive to improve transaction security, as better security reduces the possibility that fraud may occur. Organizations such as the Payment Card Industry Security Standards Council create standards that payment card acquirers and processing companies are expected to follow in order to encrypt card information at the point-of-interaction (POI) and later decrypt and process the transaction.
Transaction authorization numbers are one way that financial institutions can reduce the possibility of fraud. They are single-use numbers and provide a two-factor authentication of a transaction. The first level of authentication may include a personal identification number (PIN) or password to access an account, while the second level of authentication may be the TAN.
Financial institutions typically provide a list of passwords or passphrases that can be used to authenticate a transaction, with each TAN only being valid for a single use. The financial institution providing the list of TANs maintains a database in which it associates each TAN to a particular user.
TANs are most commonly used in online transaction verifications. When an individual or business starts the transaction it may be provided with the TAN in an email, in an SMS text message, or through another method. The delivery method has typically been authenticated beforehand through a previous interaction, such as a bank sending a text message confirming that a particular phone number is linked to an account. When a transaction is being conducted, the user will receive a message with the TAN code, and will be required to input that code in a field on a web-based form. If the code is correctly matched, the transaction will be processed.
Transaction Authentication Numbers and Two-factor Authentication
As Americans have moved more of their activities online, the use of transaction authentication numbers has spread from financial institutions to many other areas of life. It is advised, for instance, that email users sign in to their email accounts using two-factor authentication, whereby one must put one’s password in along with a transaction authentication number. These are usually kept by the user on a list of one-time codes, or the number is retrieved via text message, email, or a telephone call.
Related terms:
Acquirer
An acquirer is a company that acquires rights to another company or business relationship through a deal. read more
What Is a Blockchain Wallet?
A blockchain wallet is a digital wallet that enables users to manage the cryptocurrencies bitcoin and ether. read more
Chip Card
A chip card is a plastic debit card or credit card that contains an embedded microchip. The chip encrypts information to increase data security. read more
Encryption
Encryption is a means of securing digital data using an algorithm and a key. read more
Personal Identification Number (PIN)
A personal identification number (PIN) is a numerical code used in many electronic financial transactions, providing additional account security. read more
Phishing
Phishing is a method of identity theft carried out through the creation of a fraudulent website, email, or text appearing to represent a legitimate firm. read more
Secure Electronic Transaction (SET)
Secure electronic transactions (SET) are early e-commerce protocols that were used to keep credit card information protected online. read more
Social Engineering
Social engineering is the act of exploiting human weaknesses to gain access to personal information and protected systems. read more
Two-Factor Authentication (2FA)
Two-factor authentication (2FA) is a security system that requires two distinct forms of identification in order to access something. read more