What is a 'Transaction Authentication Number (TAN)'

A transaction authentication number is a one-time code used in the processing of online transactions. A transaction authorization number (TAN) represents an additional layer of security beyond a password to securely log into an account or conduct a transaction.

BREAKING DOWN 'Transaction Authentication Number (TAN)'

Transaction authentication numbers (TANs) provide extra security. Merchants and payment card companies have an incentive to improve transaction security, as better security reduces the possibility that fraud may occur. Organizations such as the Payment Card Industry Security Standards Council create standards that payment card acquirers and processing companies are expected to follow in order to encrypt card information at the point-of-interaction (POI) and later decrypt and process the transaction.

Transaction authorization numbers are one way that financial institutions can reduce the possibility of fraud. They are single-use numbers and provide a two-factor authentication of a transaction. The first level of authentication may include a personal identification number (PIN) or password to access an account, while the second level of authentication may be the TAN.

Financial institutions typically provide a list of passwords or passphrases that can be used to authenticate a transaction, with each TAN only being valid for a single use. The financial institution providing the list of TANs maintains a database in which it associates each TAN to a particular user. 

TANs are most commonly used in online transaction verifications. When an individual or business starts the transaction it may be provided with the TAN in an email, in an SMS text message, or through another method. The delivery method has typically been authenticated beforehand through a previous interaction, such as a bank sending a text message confirming that a particular phone number is linked to an account. When a transaction is being conducted, the user will receive a message with the TAN code, and will be required to input that code in a field on a web-based form. If the code is correctly matched, the transaction will be processed.

Transaction Authentication Numbers and Two-factor Authentication

As Americans have moved more of their activities online, the use of transaction authentication numbers has spread from financial institutions to many other areas of life. It is advised, for instance, that email users sign in to their email accounts using two-factor authentication, whereby one must put one’s password in along with a transaction authentication number. These are usually kept by the user on a list of one-time codes, or the number is retrieved via text message, email, or a telephone call.

  1. Message Authentication Code - MAC

    A message authentication code (MAC), or tag, is a security code ...
  2. Two-Factor Authentication (2FA)

    Two-factor authentication (2FA) is a second layer of security, ...
  3. Authorization Only

    Authorization only is a type of transaction that creates a pending ...
  4. Reference Number

    A reference number is a unique identifier assigned to each transaction ...
  5. On Chain Transactions (Cryptocurrency)

    On-chain transactions occur on the cryptocurrency blockchain, ...
  6. Personal Identification Number ...

    A personal identification number (PIN) is a numerical code used ...
Related Articles
  1. Insights

    Detailed Ways to Protect Digital Data

    Knowing how to protect digital data has become a big concern these days. Here are four easy ways to keep your personal information safe.
  2. Investing

    How to (Mostly) Prevent Twitter App Hacks

    The most recent large-scale Twitter account hack has prompted some users to take extra precautions.
  3. Tech

    11 Ways to Help Prevent Identity Theft

    Identity theft is no joke. Here are 11 ways to help prevent falling victim to it.
  4. Investing

    Synaptics Unveils a New Level of Mobile Security

    It was just a couple of weeks ago that Synaptics (NASDAQ: SYNA) debuted new, cutting-edge  optical fingerprint sensors that will enable authentication through a glass device cover. Now, the ...
  5. Taxes

    It's Tax Season, Are You Prepared?

    It's tax season again. Use these tips to be prepared to file and protect yourself from cybercrime.
  6. Insights

    How to Protect Your Assets From Cyber Thieves

    Taking these precautions can keep you a step ahead of identity thieves and fraudsters.
  7. Tech

    De Beers Using Blockchain to Authenticate Diamonds

    De Beers will launch the first industry-wide blockchain platform in a bid to crack down on "conflict diamonds."
  8. Tech

    Microsoft Will Use Blockchain To Build New Digital Identity

    Microsoft plans to use blockchain to build a new digital identity that gives users control over their personal details.
  9. Tech

    Could Blockchain Really Have Better Security Than Banks?

    Some experts believe adopting security measures used by banks could help to strengthen the viability of blockchain technology.
  10. Tech

    7 Ways to Protect Against Credit Card Hacks

    If your credit card hasn't been hacked yet, it may just be a matter of time. Here's how to protect yourself as much as possible before and after it happens.
  1. What's the difference between cash-on-delivery differ and delivery against payment?

    Find out more about cash on delivery and delivery versus payment transactions and the difference between these two types ... Read Answer >>
  2. How much more will it cost me to buy an odd lot of shares?

    A round lot is a predetermined number of shares of stock - usually 100 shares, while an odd lot refers to any number of shares ... Read Answer >>
Trading Center