iGaming Payment Processor & Crypto Gateway

Payment gateway is a third-party between merchants and customers that securely take the money from customers and send it to merchant’s bank account. It is a virtual equivalent of a physical point-of-sale terminal that located in most of retail outlets. Payment gateway performs the important role in processing and authorizing the payment or transactions between customer and merchants. As for crypto payment gateway enables merchants to use Bitcoin and altcoins for their business and also to accept payments in traditional currencies such as USD, Euro, etc. The bitcoin payment service instantly converts the received bitcoins into the currency of your choice, eliminating the volatility risk. The money gets added to your account, and it finally gets credited to your designated bank account at the decided frequency once the accumulated account crosses the threshold limit.

All | # A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
There are currently 12 names in this directory beginning with the letter S.
Security Code
A three- or four-digit value printed onto the front or back signature panel of a payment card. This code is uniquely associated with an individual card and is used as an additional check to ensure that the card is in possession of the legitimate cardholder, typically during a card-not-present transaction. Also referred to as card security code.

Security Mechanism
Security mechanism is a system of elements allowing to control how users can access the system as well as perform different tasks. User access is defined through three aspects: (1) Actions - deals with actions that a user can perform within the system. For example, access different perspectives and forms and perform tasks within these forms; (2) Data access - deals with data that a user has access to, for example, data associated with a particular merchant, reseller, etc; (3) Functions - deals with functions that a user can fulfill within the various business processes implemented in the system.

Sensitive Authentication Data
Security-related information used to authenticate cardholders and/or authorize payment card transactions, stored on the card’s magnetic stripe or chip

SET (Secure Electronic Transaction)
This is a system for ensuring the security of payment by bank cards, developed by VISA, MasterCard, Microsoft and several leading banks, based on public key encryption of information related to card parameters and the separation of information between transaction participants in such a way that none of the participants in the settlement has the entire information. With the SET standard, a buyer and a seller can uniquely identify each other by exchanging digital SET certificates.

Settlement / Capture
This is the second phase of the payment processing, when the previously authorized amount is withdrawn from the card holder’s account and transferred to merchant’s account. The general practice is to do this at the end of the business day.

Skimming
Stealing card data directly from the consumer’s payment card or from the payment infrastructure at a merchant location such as with an unauthorized hand-held card reader or via modifications made to the merchant’s payment terminal. Its purpose is to commit fraud, the threat is serious, and it can hit any merchant’s environment.

Small Merchant
A small merchant is typically an independently owned and operated business with a single location or a few locations, and with limited or no IT budget and often with no IT personnel.

SRED (Secure Reading & Exchange of Data)
A set of PCI PTS requirements designed to protect and encrypt card data in payment terminals. A PCI Council-listed Point-to-Point Encryption (P2PE) solution must use a PTS-approved and listed payment terminal with SRED enabled and actively performing card data encryption.

Stolen Data
The result of individuals bypassing security systems through hacking or data breaches to access sensitive personal information. This information is used by hackers or sold on the dark web.

Sub-batch
A sub-group of transactions that a batch contains. Batch transactions are split into sub-batches by the system to meet the requirements of a particular processor for the following reasons: — Quantity limitation for the transactions included in one batch. If a batch contains a number of transactions that exceeds the fixed limit, it is divided into several sub-batches. The maximum quantity of the transactions included in one file submitted to the processor is defined in transactionSubBatchLimit property of the corresponding Processing Profile. If a sub-batch file contains less transactions than set in the limit, one file (Provider) is generated. In cases when a sub-batch contains a larger number of transactions, two or more files (Providers) are generated. — The difference in how transactions are processed. For example, a batch may contain both direct debit and payment card transactions. In this case, sub-batches are created for processing to be properly performed within the system.

Submitter
Submitter is a software platform, integrated with the gateway via API. For the integration of submitter within the gateway, service user is used. T

SWITCH
A payment ecosystem platform that enables payment transactions to be routed from one payment system participant to another, whether within the same network or between different networks or schemes.
iGamingz
Logo