DEFINITION of 'Transaction Authentication Number (TAN)'

A one-time code used in the processing of online transactions. A transaction authorization number (TAN) represents an additional layer of security beyond a password to securely log into an account or conduct a transaction.

BREAKING DOWN 'Transaction Authentication Number (TAN)'

Merchants and payment card companies have an incentive to improve transaction security, as better security reduces the possibility that fraud may occur. Organizations such as the Payment Card Industry (PCI) create standards that payment card acquirers and processing companies are expected to follow in order to encrypt card information at the point-of-interaction (POI) and later decrypt and process the transaction.

Transaction authorization numbers are one way that financial institutions can reduce the possibility of fraud. They are single-use numbers and provide a two-factor authentication of a transaction. The first level of authentication may include a personal identification number (PIN) or password to access an account, while the second level of authentication may be the TAN.

Financial institutions typically provide a list of passwords or passphrases that can be used to authenticate a transaction, with each TAN only being valid for a single use. The financial institution providing the list of TANs maintains a database in which it associates each TAN to a particular user.

TANs are most commonly used in online transaction verifications. When an individual or business starts the transaction it may be provided with the TAN in an email, in an SMS text message, or through another method. The delivery method has typically been authenticated beforehand through a previous interaction, such as a bank sending a text message confirming that a particular phone number is linked to an account. When a transaction is being conducted, the user will receive a message with the TAN code, and will be required to input that code in a field on a web-based form. If the code is correctly matched, the transaction will be processed.

  1. Credit Card Authentication

    The merchant’s process of making sure a customer’s credit card ...
  2. Authorization Code

    A generic term that refers to a code or password that identifies ...
  3. Transaction Identifier

    A unique identifier assigned by a business to each transaction ...
  4. Authorization Only

    A type of sale transaction that creates a pending transaction ...
  5. Authorization Date

    The month, day and year when a credit card transaction is approved ...
  6. Validation Code

    A series of three or four numbers on the front or back of a credit ...
Related Articles
  1. Tech

    Bitcoin Transactions Vs. Credit Card Transactions

    We provide an overview of the differences between bitcoin and credit card transactions, and the advantages of using one over the other.
  2. Tech

    How Much Cheaper are Bitcoin Fees than Credit Card Fees?

    Bitcoin transaction fees are starting to rise as the network gets backlogged due to more usage, but are still much lower than typical credit card fees.
  3. Investing

    How to (Mostly) Prevent Twitter App Hacks

    The most recent large-scale Twitter account hack has prompted some users to take extra precautions.
  4. Managing Wealth

    How Foreign Transaction Fees Work

    Using a credit card when you travel can be costly. Here's what you need to know about foreign transaction fees – plus tips on making purchases abroad.
  5. Taxes

    It's Tax Season, Are You Prepared?

    It's tax season again. Use these tips to be prepared to file and protect yourself from cybercrime.
  6. Personal Finance

    Alternate Methods Of Online Payment

    Paying by credit is one of the most common methods of payment for online shopping in the U.S. However, there are many other options worth testing out.
  7. Personal Finance

    4 Best and Safest Password Manager Apps for 2016

    Find out which password managers are the best at keeping your passwords secure while managing critical data you use in your daily digital life.
  8. Insights

    How to Protect Your Assets From Cyber Thieves

    Taking these precautions can keep you a step ahead of identity thieves and fraudsters.
  1. Why are EMV cards more secure than traditional debit and credit cards?

    Learn about EMV chip technology for debit and credit cards. Explore different transactions where EMV chips making paying ... Read Answer >>
  2. Why do credit card companies calculate revenue splits in terms of basis points?

    Discover how revenue splitting works and how credit card companies are able to utilize basis points in revenue splits to ... Read Answer >>
  3. Given a good bookkeeping system, would financial accounting be necessary?

    Bookkeeping and financial accounting may seem like they are new creations, but variations have been around for millennia. ... Read Answer >>
  4. How do I use an online security token?

    Learn about the most popular kinds of authentication tokens, what differentiates them and how to use them to protect your ... Read Answer >>
Trading Center