Business and Accounting Technology

How Payment Processing Works: From Authorization to Settlement

Explore the intricate system behind every digital transaction. Learn how payments are securely processed from start to finish.

Payment processing is a structured sequence of actions that enables the secure transfer of funds from a customer to a business. This process underpins modern commerce, facilitating the exchange of goods and services in both physical and digital environments. It transforms payment information into actual fund transfers, ensuring that financial transactions are completed efficiently and securely.

Key Participants

The customer initiates the transaction using their chosen payment method. The merchant is the business accepting payment for goods or services.

A payment gateway securely transmits payment data from the merchant’s point-of-sale system or e-commerce platform. It encrypts sensitive information and sends this data to the payment processor.

A payment processor routes card payment data between banks and networks. They are responsible for ensuring sensitive financial information is transmitted securely and accurately.

The acquiring bank, also known as the merchant’s bank, is the financial institution that processes credit and debit card payments on behalf of the merchant. It holds the merchant’s bank account and receives funds from transactions.

Card networks, such as Visa and Mastercard, connect issuing banks and acquiring banks, providing the technical framework and rules for processing transactions. They facilitate the routing of transaction data and funds between these financial institutions.

The issuing bank is the financial institution that issues the customer’s payment card and holds their account. This bank is responsible for authorizing or declining transactions based on factors like fund availability and card validity. They also monitor purchases for signs of fraud.

The Transaction Flow

The payment process unfolds in distinct stages, beginning with authorization.

When a customer initiates a payment, the merchant’s system sends this information to the payment gateway. The gateway then encrypts the data and securely transmits it to the payment processor.

The payment processor forwards the authorization request to the card network. The card network then routes this request to the issuing bank, which checks the card’s validity, verifies sufficient funds or credit, and assesses for potential fraud. The issuing bank sends an approval or decline response back through the card network, processor, and gateway to the merchant. This initial authorization places a temporary hold on the funds without actually transferring them.

Following authorization, the process moves to batching and clearing. Merchants group all authorized transactions into a “batch.” This batch is then sent to their acquiring bank, which transmits these batch details to the card network.

The card network clears transactions by exchanging data between acquiring and issuing banks. This step involves reconciling the financial data for each transaction, ensuring accuracy before the actual transfer of funds. Clearing facilitates the exchange of payment information, matching authorization records with transaction details.

The final stage is settlement, where the transfer of funds occurs. The issuing bank transfers the funds for approved transactions to the card network. The card network then transfers these funds to the acquiring bank. Finally, the acquiring bank deposits the funds into the merchant’s bank account. Merchants incur various fees during this process, including interchange fees paid to the issuing bank, assessment fees charged by card networks, and markups from the payment processor.

Security in Payment Processing

Protecting sensitive financial information is important in payment processing, requiring strong security measures.

Encryption scrambles data during transmission, converting it into an unreadable format to prevent unauthorized access. This ensures that even if data is intercepted, it remains unintelligible without the correct decryption key.

Tokenization offers another layer of security by replacing sensitive card data with a unique identifier called a token. If a data breach occurs, only the meaningless token is exposed, not the actual card details. The original sensitive data is stored securely in a separate token vault.

The Payment Card Industry Data Security Standard (PCI DSS) provides security standards that organizations handling branded credit cards must adhere to, designed to protect cardholder data. Compliance involves measures like maintaining a secure network, protecting stored cardholder data, implementing strong access control measures, and regularly monitoring and testing networks.

Different Payment Methods

The core payment processing flow applies broadly across various payment methods, with some operational nuances.

Credit card processing follows the standard authorization, batching, and settlement flow, drawing funds from a pre-approved credit line.

Debit card processing is similar to credit card processing, but funds are directly withdrawn from the customer’s checking account. While some debit transactions may use a Personal Identification Number (PIN) and route through specific debit networks, many are processed over the same card networks as credit cards, particularly when a signature is used.

Automated Clearing House (ACH) payments facilitate direct bank-to-bank transfers for transactions like payroll or bill payments. Unlike card transactions, ACH operates on a batch-oriented system, with authorizations involving bank account and routing numbers. Settlement for ACH payments usually takes several business days, as it does not rely on card networks but rather on the ACH network.

Mobile payment methods leverage tokenization and existing card networks. When a customer uses a mobile wallet, a tokenized version of their card data is transmitted and flows through the standard card processing system. The underlying authorization, clearing, and settlement steps remain the same, with the difference being the initial data capture from the mobile device.

Previous

What Is the Difference Between ACH and Autopay?

Back to Business and Accounting Technology
Next

What Is End-User Computing (EUC) in Banking?