This is a simplified example of how cellular payment tokenization usually functions by means of a mobile phone software by using a charge card.[1][2] Methods apart from fingerprint scanning or PIN-figures can be used in a payment terminal. Tokenization, when applied to data security, is the entire process of substituting a delicate details componen