Feeds

Google pockets card payment biz, slips it into Wallet

Token effort - or strategic brainwave?

High performance access to file storage

Google has bought payment processor TxVia to beef up its Wallet offering, putting scalable payment and token management into the Chocolate Factory's hands.

TxVia provides a back-end service for prepaid cards including gift tokens, loyalty schemes and travel cards. It has 100 million customers and links to all the important clearing houses. Google Wallet has apparently been working with TxVia for the last year or so, and has now decided to swallow the company for an undisclosed sum.

Over the last five years, TxVia has raised somewhere in the region of $50m, the last round being in 2010, but it has contacts and experience which Google Wallet desperately needs, and while other electronic-wallet schemes are signing up an ever-increasing range of partners, it is worth remembering that the only really successful example owes that success to its vertical integration.

Felica is the Japanese e-Wallet platform, which is still 38 per cent owned by DoCoMo. The platform includes the payment system EDY, which is run by BitWallet, a company set up by a consortium which included DoCoMo, which can also provide banking and credit-card services, should you so wish.

DoCoMo's weight in the mobile market ensured handset compatibility, and the vertical integration ensured that DoCoMo made its money back.

Outside Japan things are much more fragmented. The operators in most countries are now organising themselves to create standard platforms, upon which payment services from Visa, for exaple – or the (newly announced) ticketing services from Ecebs – will sit. Banks will then be able to offer instances of cards, while train companies offer electronic tickets, and the customer will sit atop the wobbling stack of participants.

All of the participants, of course, believe themselves to be the keystone in the process – and want suitable restitution.

Google's purchase of TxVia ties some of those participants together, and the fact that both the technology and platform are coming from the same place could also provide a firmer footing. If Apple gets into the NFC business then it will be that vertical integration which differentiates it, so Google is perhaps wise to strap together what it can, while it can. ®

SANS - Survey on application security programs

More from The Register

next story
A black box for your SUITCASE: Now your lost luggage can phone home – quite literally
Breakfast in London, lunch in NYC, and your clothes in Peru
Broadband Secretary of SHEEP sensationally quits Cabinet
Maria Miller finally resigns over expenses row
AT&T threatens to pull out of FCC wireless auctions over purchase limits
Company wants ability to buy more spectrum space in auction
EE dismisses DATA-BURNING glitch with Orange Mail app
Bug quietly slurps PAYG credit - yet EE denies it exists
Like Google, Comcast might roll its own mobile voice network
Says anything's possible if regulators approve merger with Time Warner
Turnbull leaves Australia's broadband blackspots in the dark
New Statement of Expectations to NBN Co offers get-out clauses for blackspot builds
Facebook claims 100 MEEELLION active users in India
Who needs China when you've got the next billion in your sights?
Facebook splats in-app chat, whacks brats into crack yakety-yak app
Jibber-jabbering addicts turfed out just as Zuck warned
prev story

Whitepapers

Designing a defence for mobile apps
In this whitepaper learn the various considerations for defending mobile applications; from the mobile application architecture itself to the myriad testing technologies needed to properly assess mobile applications risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.