Feeds

Google Wallet left on margins by ISIS tap-pay hookup

But Chocolate Factory has the only working handset

Website security in corporate America

Visa, MasterCard, Discover and American Express have all signed onto US operator consortium Isis, leaving Google Wallet with just MasterCard as a payment partner.

The US operator consortium – set up by AT&T, T-Mobile USA and Verizon – has announced that the four biggest payment processors will create mobile payment applications compatible with the Isis infrastructure, which will conform to the GSMA-backed Trusted Service Manager standard.

When it was launched, Isis had plans to become a payment processor in its own right, but that didn't go down well with the existing players, and the consortium changed tack to welcome existing players with a standard infrastructure – a decision which has now paid off with broad industry support.

Google Wallet, meanwhile, has only MasterCard's backing. When it launches to the public, later this year, the Google Wallet will only contain a Google pre-paid card and (potentially) one from Citi, while an Isis phone could contain any MasterCard, Visa, Discover or American Express payment card.

Google Wallet will also need a MasterCard Paypass terminal, while Isis devices should work anywhere (depending on the installed payment cards).

If there were any Isis phones, of course... Isis-compatible hardware has yet to arrive, though with operators asking manufacturers for support, it should come pretty quickly. Google Wallet already has one phone – the Nexus S 4G on Sprint – with others promised very soon. It will be interesting to see how manufacturers respond to conflicting specifications from Google and the operators – appeasing both is possible, but presents a more-complicated user experience.

The UK equivalent to Isis still lacks a name, but is apparently working on a logo. NFC World reports that the bigger European operators reckon the logo is the key to widespread adoption of pay-by-wave, so have started development – presumably in the hope that a decent logo will attract the same payment processors who've signed up to Isis. ®

Internet Security Threat Report 2014

More from The Register

next story
Brit telcos warn Scots that voting Yes could lead to HEFTY bills
BT and Co: Independence vote likely to mean 'increased costs'
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
ISPs' post-net-neutrality world is built on 'bribes' says Tim Berners-Lee
Father of the worldwide web is extremely peeved over pay-per-packet-type plans
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
Radio hams can encrypt, in emergencies, says Ofcom
Consultation promises new spectrum and hints at relaxed licence conditions
Turnbull: NBN won't turn your town into Silicon Valley
'People have been brainwashed to believe that their world will be changed forever if they get FTTP'
Google+ GOING, GOING ... ? Newbie Gmailers no longer forced into mandatory ID slurp
Mountain View distances itself from lame 'network thingy'
Blockbuster book lays out the first 20 years of the Smartphone Wars
Symbian's David Wood bares all. Not for the faint hearted
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.