Feeds

Google Wallet left on margins by ISIS tap-pay hookup

But Chocolate Factory has the only working handset

Providing a secure and efficient Helpdesk

Visa, MasterCard, Discover and American Express have all signed onto US operator consortium Isis, leaving Google Wallet with just MasterCard as a payment partner.

The US operator consortium – set up by AT&T, T-Mobile USA and Verizon – has announced that the four biggest payment processors will create mobile payment applications compatible with the Isis infrastructure, which will conform to the GSMA-backed Trusted Service Manager standard.

When it was launched, Isis had plans to become a payment processor in its own right, but that didn't go down well with the existing players, and the consortium changed tack to welcome existing players with a standard infrastructure – a decision which has now paid off with broad industry support.

Google Wallet, meanwhile, has only MasterCard's backing. When it launches to the public, later this year, the Google Wallet will only contain a Google pre-paid card and (potentially) one from Citi, while an Isis phone could contain any MasterCard, Visa, Discover or American Express payment card.

Google Wallet will also need a MasterCard Paypass terminal, while Isis devices should work anywhere (depending on the installed payment cards).

If there were any Isis phones, of course... Isis-compatible hardware has yet to arrive, though with operators asking manufacturers for support, it should come pretty quickly. Google Wallet already has one phone – the Nexus S 4G on Sprint – with others promised very soon. It will be interesting to see how manufacturers respond to conflicting specifications from Google and the operators – appeasing both is possible, but presents a more-complicated user experience.

The UK equivalent to Isis still lacks a name, but is apparently working on a logo. NFC World reports that the bigger European operators reckon the logo is the key to widespread adoption of pay-by-wave, so have started development – presumably in the hope that a decent logo will attract the same payment processors who've signed up to Isis. ®

Protecting against web application threats using SSL

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
Bonking with Apple has POUNDED mobe operators' wallets
... into submission. Weve squeals, ditches payment plans
This flashlight app requires: Your contacts list, identity, access to your camera...
Who us, dodgy? Vast majority of mobile apps fail privacy test
Apple Watch will CONQUER smartwatch world – analysts
After Applelocalypse, other wristputers will get stuck in
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.