Browse Definitions :
Definition

payment gateway

A payment gateway is a service that authorizes a user’s transfer of funds between financial institutions to sellers without direct delivery of either bank or credit card account information. Payment gateways include PayPalGoogle Wallet, Apple Pay, Ali Pay and Amazon Pay.

Payment gateways allow the indirect use of bank accounts and credit card accounts online at stores that offer both online and in-person retail purchasing, also known as clicks and mortar, or traditional retail with only brick and mortar stores. When using a payment gateway, the user’s financial data is never submitted directly but transferred between a payment portal and the user’s bank or credit card. The information is transferred covertly and protected by encryption.

In the past, payment gateways were a necessity to make payment through bank accounts when shopping online. Early consumer confidence in shopping online was low with as consumers were concerned with customer data security and possible theft of their financial information. Payment gateways provided a means to make a payment to these sites without involving the direct information of each account to which the payment is tied. More recently, near field communication (NFC) in mobile devices has been used in conjunction with payment gateways for purchases at retail locations by way of tapping a phone on any NFC point-of-sale terminal upon checkout.

This was last updated in June 2018

Continue Reading About payment gateway

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

  • erasure coding

    Erasure coding (EC) is a method of data protection in which data is broken into fragments, expanded and encoded with redundant ...

Close