Global digitalization is not a new trend, yet it’s happening a lot faster as a result of the COVID-19 pandemic. As online payments grow in number, the need for better protection of sensitive data increases. But can payment tokenization handle the serious challenge ahead?
In simple terms, tokenization means turning data or an asset into something equivalent to them. The concept of tokenization was developed by TrustCommerce in 2001 as a way to protect sensitive transactional data. Before that, merchants stored credit card information on their servers, so potentially anyone with access to the system could view it. The only guarantee of security was the hope that the employee would not use the data for their own purposes.
The system developed by TrustCommerce replaced the primary account number (PAN) with a random number – a token. Consequently, merchants no longer needed to store credit card data themselves, which greatly improved data security.
The fact that tokenization is a hot topic today is also evidenced by the numbers: the tokenization market was valued at $1.2 billion in 2020, with a CAGR of 22.4% predicted for the period 2021–2026.
Let’s dive deeper into tokenization in payments, analyze how it differs from encryption, and find out how it affects eCommerce businesses and their customers.
What is payment tokenization?
Payment tokenization is the process of replacing sensitive data such as credit card number, account number, and address with a series of randomly generated numbers that become a token. The token contains between thirteen and nineteen alphanumeric characters, which do not include the PAN or any details that reveal the user’s identity.
Essentially, tokens stand guard over valuable information and sensitive data. They can be used in a database or in internal systems while the original information is safely stored in a token vault.
Another important point is that tokens are unique and irreversible. This means that an individual token can only be used once, for one purchase. As there is no mathematical relationship between a token and its original number, tokens cannot be reverted to their original form.
Tokenization vs encryption: what’s the difference?
Data encryption is probably the most popular and common method for protecting sensitive information. Encryption secures information such as cardholder data, payment card information, financial account numbers, and other types of confidential data by turning it all into code.
Although the tokenization and encryption concepts may seem similar at first glance, there are crucial differences between the two.
Firstly, tokenization and encryption involve different methods of security. In the case of tokenization, it is a token (thanks, Captain Obvious). In encryption, however, it’s a key that provides security.
Secondly, tokenization replaces sensitive data with an irreversible token and stores the original data outside the original environment. In the encryption process, information is encoded and then, when it needs to be decrypted, a key or password is used.
Since tokens cannot be returned to their initial shape – that is, traced back to the original credit card number, and because PAN data is never displayed, this method of protecting information is more secure than encryption. The latter uses a reconstructed mathematical formula. As the encrypted data can be decrypted, there is a significant risk of confidential information being disclosed.
According to MarketsandMarkets’ research on tokenization, there is still a lack of knowledge and understanding of encryption and tokenization among end-users. Many users continue to stick with the old payment security system, even though encryption is more vulnerable to cyber attacks than tokenization.
Payment tokenization and PCI compliance
Many companies that deal with credit card information and accept and store confidential data on their networks will often experience difficulties with Payment Card Industry Data Security Standard (PCI DSS) compliance. Failure to comply with the standard can lead to fines, reputation damage, and loss of brand credibility.
Those who choose encryption over tokenization face an obstacle related to encryption’s reversibility. PCI Security Standards Council treats encrypted data as sensitive. Therefore, in line with PCI DSS, additional measures should be taken to enhance the security of confidential information. Meanwhile, the PCI and other security standards do not require organizations to provide additional protection for tokenized data.
Indeed, tokenization works in such a way that the payer’s credit card information is removed, and thus the risk of data leakage is greatly minimized. A reduced amount of sensitive data means there are fewer requirements to be followed, leading to faster audits.
By applying tokenization, it is also easier for businesses to comply with the standard and, at the same time, to enjoy lower security costs and minimal liabilities.
Credit card data portability and tokenization
First, we need to understand what data portability is and why it is important. Suppose you are a customer of an online store where on a previous visit you entered your credit card details. Since then, because the company has decided to optimize transaction processes or start operating in new countries, it has had to change payment gateways and adapt to new gateway providers. Thanks to credit card data portability, you will not notice this and won’t need to re-enter your billing information.
Thus, credit card data portability lies in the ability to transfer a customer’s credit card information from one payment gateway to another.
Another question concerns the connection between data portability and tokenization. If we combine these two elements, how will they meet PCI DSS?
In this case, merchants have two options. They can use a dedicated payment solution that will collect and store PAN data in a separate vault, or they can export their data and create new tokens in storage for a specific gateway. The second option is a little lengthy and complicated, but the first one tends to be quite painless and efficient.
Spreedly is an example of a platform that offers this kind of payment orchestration solution. As for its payment tokenization method, Spreedly provides a PCI DSS compliant vault where it stores captured PAN information; the payment data doesn’t even touch the merchant’s servers. The generated token can be transferred over various networks and stored without the danger of disclosing the actual PAN.
Here’s how it works. When the merchant is ready to process the transaction, the token is transferred to Spreedly along with the transaction information. The platform then transfers the stored card details to the designated payment gateway. One token can be processed for transactions through hundreds of PCI DSS-compliant gateways and endpoints. This enables Spreedly to provide data portability for merchants pursuing a multi-provider strategy.
What are the key benefits of payment tokenization?
It’s worth stressing again that payment card tokenization helps protect sensitive information and prevent data breaches. However, these are not the only advantages of this technology: tokenization also increases customer trust, reduces and prevents financial and reputational damage, and improves user experience.
Increased consumer trust
Customers will use credit cards and buy goods from stores whose information security they have confidence in. It is only logical that buyers will use the services of those sellers who have a good reputation and no history of information leaks. So by applying tokenization, merchants preserve their credibility and increase consumer trust.
Enhanced user experience
The buyer’s card information can be stored in the mobile wallet or when making online purchases. Thanks to tokenization, customers don’t need to disclose the original data about their bank card when replenishing their wallet or making the next payment. What’s more, customers don’t have to fill out payment details for every purchase.
Reduced financial and reputational damage
Data breaches are extremely costly to businesses. The Ponemon Institute independently conducted research that involved a quantitative analysis of 524 recent data breaches across 17 regions and 17 industries. Their findings were presented in the 2020 Cost of a Data Breach Report: on average, a data breach costs businesses $3.86 million, and it takes around 280 days to identify and contain a breach.
Although tokenization is not a panacea for all the troubles associated with data breaches, it significantly reduces the likelihood of these situations occurring. With tokenization, merchants no longer have to deal with sensitive payment information and, as we have seen, they don’t need to store any data.
On top of this, merchants don’t need to invest a lot of money and resources in data protection – because everything is covered by payment tokenization. Even if a fraudster manages to gain access to the tokenized data, they won’t be able to use it because they will only see a set of random characters which are in no way related to credit card information.
Tokenization in payments: examples
Now that we are living through a global pandemic, even the most avid fans of cash payments have been switching to online forms of payment. Statistics show that in January 2019 online platforms were visited 13.87 billion times, but in the same month in 2020, the numbers had risen to 16.07 billion visits worldwide. Five months later, in June, retail websites had received nearly 22 billion visits.
Online shopping platforms are experiencing an unprecedented increase in global traffic, which is why it’s more important than ever that retailers take care of payment security and customers’ data protection.
Now we’ll look at where tokenization can be put to use, and where it helps both merchants and shoppers.
- Digital wallet
Google Pay, Apple Pay, Samsung Pay, and many other digital wallet services use tokenization to ensure the safety of users’ data. Users can create a token on Google Pay, for instance, via their Android mobile phone. Every time they want to buy something, they can use their phone to make contactless payments through POS without even taking their credit card out of their pockets.
A user who has wristbands or smartwatches can create, say, an Apple Pay token, and then use it to pay for their purchases.
By the way, Mastercard recently partnered with MatchMove, which is a fintech company, and Tappy Technologies, a world-leading wearable payment integrator, to enable payment chip tokenization for custom wearables.
The result of this collaboration is that now Mastercard holders can safely add their payment cards to the chip and attach the chip to any battery-free wearable devices or accessories. Thus, the user can turn their favorite accessory into a contactless payment device protected by tokenization.
- In-app payments
If you use Android devices, then you can create a token using Google Pay. Similarly, you can create an Apple Pay token on your iPad using the same credit card. If you play games and want to buy upgrades, you don’t need to enter your credit card information or exit the app. You can conduct in-app payments and be sure that all your information is well protected.
- Billing and recurring payments
For any company working with recurring payments, tokenization can be a blessing to the business. With credit card payment tokenization, a company can store customers’ billing information for subsequent automatic payments. The company won’t even need to keep all customer data on a file: it can store customers’ tokens and use them for the next purchase.
What companies and industries are using tokenization?
Thanks to its effectiveness and a growing number of successful case studies, tokenization is being taken up by more and more companies and service providers. Let’s move on now from the theory and see how this type of data protection is actually working in practice.
Visa Token Service
Visa Inc., an American multinational financial services corporation, launched its Visa Token Service (VTS) back in 2014. Through this payment tokenization solution, the company aimed to reduce the incidence of credit card fraud and enable its cardholders and customers to enjoy more efficient and secure digital shopping and trading.
On June 23, 2020, Visa Inc. announced that the company had issued over 1 billion tokens worldwide via VTS. In 2021, the number of tokens issued has passed the 2 billion mark. In reaching this milestone, the corporation demonstrated that tokenization is an effective method of data protection for both credit card and mobile purchases.
Visa Token Service works by simply replacing a cardholder’s 16-digit account number with a secure token that protects the card number. A payment token can be limited to a specific eCommerce merchant, mobile device, or a certain number of purchases before expiration.
Google, a tech company that really needs no introduction, is also using tokenization in its online payment system to keep both merchants and their customers safe from data leaks and loss of funds.
To complete the mobile payment tokenization process, Google Pay (formerly Android Pay) works with card-issuing banks, token service providers (TSPs), mobile device manufacturers, payment terminal providers, and payment networks. Together, they create a tokenization infrastructure that enables payers to verify their identity when attaching a card to Google Pay (ID&V), and that will also securely store customer’s tokens in their mobile devices and transfer tokens to the payment terminal during in-store transactions that use the Google Pay application. The infrastructure also ensures that NFC hardware meets all the industry standards.
Here’s a step-by-step explanation of how Google Pay tokenization works.
- 1. A user attaches their card to the Google Pay app.
- 2. Google Pay requests a token representing the card the user is trying to add from the bank that issued the card.
- 3. After token issuance, the card becomes tokenized: it receives a unique identification number associated with it.
- 4. Google Pay encrypts the new tokenized card so it is ready for payments.
When the customer is ready to make a purchase, they tap their mobile phone on the terminal as usual or select Google Pay as their payment method in the application.
Google Pay responds with a tokenized customer card and a cryptogram, the latter acting as a one-time password. Next, the cryptogram is verified and the token is matched with the buyer’s card number. Lastly, the acquiring bank and the customer’s card-issuing bank use the existing customer information and decrypted customer billing information to complete the transaction.
As stated on Google’s support page, tokenization allows their customers to enjoy protection against the loss and theft of money and personal information. For merchants, meanwhile, tokenization means they needn’t keep so much sensitive customer information, and so data breaches become less of a worry.
Apple, as a company that definitely won’t compromise its users’ data, uses tokenization to securely transfer money from a customer to a merchant.
When making a payment via Apple Pay, the app generates a token and a one-time security key. Next, the data is transferred to the payment terminal and the token is sent to the so-called token storage, a secure database that links tokens with real accounts. If everything is acceptable with the security key, the token store transfers the payment and then awaits confirmation for debiting funds to be returned to the payment terminal. The POS doesn’t see any information about your card as the token storage is located in the payment system.
With Apple Pay tokenization, customer information is only visible to the payment processor and the financial institution that issued the card. This ensures high security and confidentiality for your data.
Samsung Pay claims to be a super-secure mobile payment service: Samsung uses tokenization to protect its users’ personal and financial information.
When a user adds their payment card to the app, the information is encrypted and sent to Samsung’s servers and, at the same time, to the card issuer’s payment network for approval. The card issuer often requests a one-time password to verify the identity of the cardholder.
Each time the user adds a payment card, a new token is generated. This happens even when the user is trying to attach a recently removed card.
It’s also worth mentioning that Samsung does not store or even have access to payment information added to Samsung Pay.
Credit card fraud is still an Achilles heel for many businesses, especially in eCommerce. According to AtlasVPN, the number of fraudulent activity reports in the United States alone rose from 17,236 in the first quarter of 2015 to 45,120 in the first quarter of 2019. In 2020 Q1, the number of reports jumped even higher — to 92,367.
Tokenization is one of the ways to protect credit card information and prevent the loss of customer data and funds. At the same time, tokenization is a very reliable technology for protecting online businesses from costly data breaches and thereby saving their money and safeguarding their reputation.
IKEA, a brand whose furniture can be found in almost every kitchen in the world, is a prime example of a company that utilizes tokenization in its online store. When a customer buys furniture from IKEA’s website, the retailer tokenizes their card number. This means that IKEA customers can pay for their online purchases knowing that tokens always guard their payment details. In addition to tokenization, IKEA’s checkout security is also enhanced by the 3D Secure service.
Payment tokenization process: a step-by-step guide
In the process of credit card tokenization, the user’s confidential information is replaced with a token, which is a one-time alphanumeric identifier that has no value or connection to the account’s owner. Below we describe how a tokenized transaction works.
Step 1. A customer decides to make a purchase. They initiate a transaction and enter their credit card information.
Step 2. The token requestor, which can be an online store or an issuer application, sends a cardholder’s PAN to the separate token vault.
Step 3. The issuer performs identification and verification (ID&V) and submits these results to the token vault. This process is called “binding” and it completes the token registration.
Step 4. The token vault transfers the registered payment token to the requestor and thereby completes the token request process.
Step 5. The acquirer transfers the token to the credit card network for further authorization. The customer’s primary account number and token are sent to the issuer who makes an authorization decision.
Step 6. After authorization, the customer’s data is stored in the bank’s secure virtual vaults, and the token is matched with the customer’s account number.
Step 7. The bank checks the availability of funds and approves or rejects the transaction.
It’s worth mentioning that when a card number and all the related information go to the merchant acquiring bank, it goes only in the form of a token.
Generally speaking, the whole payment tokenization process is hidden from customers’ eyes, so when making electronic payments, they don’t need to do anything differently. When it comes to merchants, for refund and recurring transactions they can also use the token, and not the actual bank card information.
Tokenization in payments brings definite benefits to both customers and merchants, as it provides robust security for sensitive information. Tokenization anonymizes customer’s actual credit card data and reduces the seller’s responsibility for storing and handling confidential payment information.
Since the generated token looks like a set of random characters and is irreversible, the chances of fraudsters gaining access to your credit card number data are extremely low. Another argument in favor of tokenization is that tokens are different at every online shop and even if a security breach occurs, all tokens will be disabled and customer information will not be available.
If you’re pretty much ready for digital transformation, eager to enhance online payment security, or looking to create a new website and mobile application, make sure you turn to a trusted web and mobile development company. Professional developers will comprehensively analyze your business case, advise you on existing technologies, and offer the solution that best fits your aims.
What You Need to Know About Payment Tokenization? ›
How does credit card tokenization work? Credit card tokenization substitutes sensitive customer data with a one-time alphanumeric ID that has no value or connection to the account's owner. This randomly generated token is used to access, pass, transmit and retrieve customer's credit card information safely.What you need to know about tokenization? ›
Tokenization is a form of masking data that not only creates a masked version of the data but also stores the original data in a secure location. This creates masked data tokens that cannot be traced back to the original data, while still providing access to the original data as needed.How does tokenization work in payments? ›
Tokenization is a process that replaces sensitive payment information with a unique identifier or token. This token can be used in place of the actual payment information, such as a credit card number, when making an online payment. Tokenization helps to protect sensitive payment data and reduce the risk of fraud.Why is tokenization important in payments? ›
Tokenization is a technology developed industry-wide to ensure that credit card data is kept secure. This is accomplished by the receiver of the cardholder data assigning a random string of characters to replace sensitive information and returning that string to the provider of the cardholder data.What are the common issues with tokenization? ›
One of the major issues with word tokens is dealing with Out Of Vocabulary (OOV) words. OOV words refer to the new words which are encountered at testing. These new words do not exist in the vocabulary. Hence, these methods fail in handling OOV words.What is the disadvantage of tokenization? ›
Because tokenization relies on complex technology and networked systems, there is a risk that hackers could access and steal digital assets. While blockchain technology is generally considered secure, there have been instances of successful cyber attacks on cryptocurrency exchanges and other blockchain-based systems.How do I Tokenize my credit card? ›
- Step 1: To make purchases and start payment transactions, go to any e-commerce merchant website or application.
- Choose your card in step 2. ...
- Secure your card in Step 3. ...
- Step 4: Approve the token's creation. ...
- Create a token in step 5.
With 850 million cards tokenized, PayPal Braintree is already one of the biggest token service providers in the world. Because of our scale, we partner closely with card networks to innovate at the cutting edge of network tokenization.Does Apple Pay use tokenization? ›
In addition to device-specific payment tokens used to securely complete a single Apple Pay transaction, you can now use Apple Pay merchant tokens to securely complete automatic reload or recurring payments independent of a device.What are the advantages and disadvantages of tokenization? ›
Tokenization is a time- and money-saving method, too. While it doesn't eliminate Payment Card Industry Data Security Standards (PCI DSS) and other compliance requirements, converting the form of vulnerable data effectively reduces your team's need to prove compliance.
What is the difference between virtual card and tokenization? ›
Like virtual cards, tokenized cards do not exist in a physical form. Unlike virtual cards, however, tokenized cards are not identified by a PAN. They are instead identified by a substitute string known as a token.Why is tokenization difficult? ›
Tokenization Challenges in NLP
A large challenge is being able to segment words when spaces or punctuation marks don't define the boundaries of the word. This is especially common for symbol-based languages like Chinese, Japanese, Korean, and Thai.
Examples of well-known decentralized finance tokens include Solana, Chainlink, Uniswap, Polkadot, Aave, and many others. Some categories of DeFi applications include decentralized lending apps, decentralized exchanges, decentralized storage sharing, etc.Can tokenization be hacked? ›
Encrypted data uses a complex algorithm, combined with an encryption key that works like a cypher to revert the data to its original state. So, if a hacker manages to compromise the key, they can read the transmission. That can't happen with tokenization, though.How many types of tokenization are there? ›
NLP tokenization types
The three categories of NLP tokenization are: Subword tokenization. Character tokenization. Word tokenization.
The global tokenization market has been witnessing astounding growth. And these factors considerably impact the global economy. A recent report highlighted that the tokenization market is expected to widen from $2.3 billion in 2021 to $5.6 billion by the year 2025.Does tokenization require blockchain? ›
While tokenization began with the idea of protecting data assets using non-blockchain tokenization, it has developed into a way to protect the ownership of many other types of assets by using blockchain technology.Are Tokenize transactions more secure than credit cards? ›
Though it is not mandatory for cardholders to tokenize their cards, it is considered a safer mode of transaction as actual card details are not shared/stored with the merchants.How secure is tokenization? ›
Tokenization makes credit card payments more secure—the payment card industry needs to comply with extensive standards and regulations. Tokenization solutions provide a way to protect cardholder data, such as magnetic swipe data, primary account number, and cardholder information.What is the difference between tokenization and cryptocurrency? ›
Cryptocurrencies are the native digital asset of blockchain networks, and a core part of how they function. Crypto tokens are secondary assets built on top of existing blockchain networks, but not a core part of how they function.
How do I Tokenize my Mastercard? ›
- Punch in your. Card details.
- Select the options. to save Securely. for future payments.
- Enter the OTP. sent via SMS, and you're done.
Visa's payment tokenization technologies help you give cardholders the confidence to pay digitally, wherever and however they like. Potential benefits: Increase authorization, reduce fraud and deliver more diverse payment options that improve the customer's experience.What is an example of a credit card tokenization? ›
Say you're buying something from a merchant that uses tokenization. If there's a tokenization system in place, it intercepts your card data and replaces it with a random string of numbers and letters. Instead of Jane Smith, account number 4567 8910 1112 1314, expiration date 10/2025, there's a token like HX46YT794RG.Does Netflix use tokenization? ›
We are also the first merchant to leverage tokenization — a method of encrypting cardholder personal data — globally to increase security for sensitive payment information.Is Google Pay tokenization? ›
When a user successfully adds their card to Google Pay, Google Pay stores a uniquely generated token on the device that has its own value. This new number, called a dynamic primary account number (DPAN) or device token, is similar to a credit card number.Are digital wallets tokenized? ›
Digital wallet – (e.g., Apple Pay or Google Wallet) requests and stores tokens for payment cards. Digital wallets undergo certification in order to utilize network tokenization services, allowing them to request and make purchases with tokens. Cardholder – owns the card that will be or has been tokenized.How do I opt for tokenization? ›
While purchasing on the e-commerce merchant website and making payments, you need to enter the credit/debit card details when checking out. At that time, you get an option to secure your card and tokenise it by selecting the 'secure your card' option.What is Mastercard tokenization? ›
Q: What is tokenization? A: Tokenization is the process of replacing a card's primary account number (PAN)—the 16-digit number on the plastic card—with a unique alternate card number, or “token.” Tokens can be used for mobile point-of-sale transactions, in-app purchases or online purchases.Which payment systems has implemented tokenization? ›
Mobile wallets like Apple Pay, Samsung Pay, Google Pay, and Android Pay use tokenization to safeguard transactions.Which tokenization is best? ›
- Whitespace tokenization. This is the most simple and commonly used form of tokenization. ...
- Punctuation-based tokenization. ...
- Default/TreebankWordTokenizer. ...
What are the common uses of tokenization? ›
Tokenization is often used to protect credit card data, bank account information and other sensitive data handled by payment processors. Payment processing use cases that tokenize sensitive credit card information include the following: mobile wallets, such as Google Pay and Apple Pay; e-commerce sites; and.Is tokenization the same as NFT? ›
What is Tokenization? Unlike NFTs, which represent irreplaceable digital assets, tokenization refers to a method of protecting sensitive data.Who can do card tokenization? ›
Any number of cards can be requested to be tokenized by a user. The customer may use any card registered with the token requestor app to complete a transaction, and they are also free to set and change daily and per-transaction quotas for tokenized card transactions, as per RBI.What is the difference between a token and a credit card number? ›
A digital credit card number or token is a credit card number that has no value by itself. This token will be the number sent during the transaction, making it more secure because the merchant never receives your real credit card number – avoiding any credit card theft.What are the 5 tokens? ›
The five tokens in Java include keywords, identifiers, operators, literals, and separators. Keywords are reserved words with special meanings in the Java language, and identifiers are names given to classes, methods, and variables.Is A Bitcoin a token? ›
Cryptocurrencies. The term crypto token is often erroneously used interchangeably with "cryptocurrency." However, these terms are distinct from one another. A cryptocurrency is used for making or receiving payments using a blockchain, with the most popular cryptocurrency being Bitcoin (BTCUSD).Can tokenization be reversed? ›
Tokenization basically comes in two flavors: reversible and irreversible. Reversible tokens can be mapped to one or multiple pieces of data. This can be accomplished using strong cryptography, where a cryptographic key rather than the original data is stored or by using a data look-up in a data vault.Who invented tokenization? ›
Shift4 is known as the inventor of payment data tokenization technology, having introduced the world's first tokenization solution of its kind to the payments industry in 2005.How do I start a tokenization business? ›
- Getting actors across the whole asset lifecycle involved to set up the project.
- Setting up compliance rules & legal.
- Creating the token itself through a software solution.
- Setting up the payment, trading and distribution mechanisms.
The key difference between network tokenization and PCI tokenization is that the card scheme issues the token, not the acquirer or payment service provider. This makes network tokens interoperable across the entire payment ecosystem, and for a broader range of use cases.
What is tokenization in banking? ›
Tokenisation is the process of replacing a card's 16-digit number on the plastic card with a unique alternate card number, or 'Token' which shall be unique for a combination of card, token requestor and device. Tokens can be used for online transactions, mobile point-of-sale transactions or in-app transactions.What is tokenization explained simply? ›
The PCI Council defines tokenization as "a process by which the primary account number (PAN) is replaced with a surrogate value called a token. A PAN may be linked to a reference number through the tokenization process.What is the 1st step of tokenization crypto? ›
Step 1: Choose an asset
Nearly any asset can be tokenized. Crypto tokens are simply representations of existing assets that run on a blockchain. Your job is to decide which part of the asset you're going to tokenize.
NFTs can represent digital or real-world items like artwork and real estate. "Tokenizing" these real-world tangible assets makes buying, selling, and trading them more efficient while reducing the probability of fraud. NFTs can represent individuals' identities, property rights, and more.How much does it cost to Tokenize an asset? ›
Asset tokenization platforms have significant costs depending upon the features. Asset token packages start around $30,000 and can range up to well over $100,000.What is the best way to invest in tokenization? ›
- Find an exchange that trades the tokenized stock you're interested in. ...
- Create an account on the selected exchange. ...
- Fund your account. ...
- Buy the stock token of your choice.