Jeton – Security

Security is a priority

When it comes to digital wallets, security is most likely your priority.

Because Jeton must adhere to financial regulations, it has very rigorous identity verification criteria. Jeton’s security is one of its most essential features, which is why the FCA has granted them a license.

Jeton Security – a safe user experience

  • Jeton employs encryption and requires users to log in using two-factor authentication.
  • Two Factor Authentication, or 2FA, is an additional layer of security that requires a password and an email address and something that only that person has, such as a 2FA code given to their mobile device.
  • Potential intruders will have a more challenging time gaining access and stealing that person’s data or identity if they use an email address and password along with a 2FA code.
  • Every consumer must go through a KYC verification process. Jeton ewallet uses an electronic Know Your Customer (KYC) approach to verify your account. By validating your account, Jeton will be able to learn more about you, protect your ewallet against unauthorized transactions, and provide you access to all of the Jeton ewallet service’s features.
  • Jeton uses the encryption technology known as tokenization to secure the safety of its customers. This solution replaces personal card data with a tokenized number, ensuring that sensitive data is never exposed during the authorization process.
  • A randomized 16-digit number (sharing the last four digits of a credit card number) is generated using a credit card account number. In contrast, the genuine account number is maintained in a secure token vault.
  • This temporary number has limited validity and is useless outside of the authorization process. Furthermore, if the token is intercepted, it is rendered void.
  • Payment card industry (PCI) compliance — a security standard that includes critical goals for achieving and maintaining certification — is the most acceptable protective measure for merchants and parties that enable Jeton purchases.

Back-end Security

1. Initiate Payment: This service should be called securely, and Jeton Pay will respond with a payment token and payment URL. We strongly advise users to save unique Jeton payment IDs and create an Authorization Token to access payment information and statuses. Each payment token has a 15-minute expiration date. If you want to check on the progress of your payment after it has expired, you must generate a new Authorization Token and use the same Jeton payment method.

2. Trigger Checkout Page: The URL supplied in the initial response should be opened in a page, tab, or any other method you like.

3. Back to Merchant – When an individual Jeton Pay user’s payment is completed successfully, Jeton Pay will provide a success URL to initiate the payment request to you.

Jeton Pay will return the consumer to the supplied fail URL or cancel the URL if the payment fails or is cancelled due to customer action. These will also be included in response to the initiate the payment request.

When consumers secure their identities with vigilance and merchants and other parties involved in Jeton’s payment processors adhere to PCI compliance, the result is an unusually high level of ewallet security.