Charge Anywhere Certifies PoS for EMV
Charge Anywhere has acquired an EMV smart-card certification that will allow it to bring compatible payment processing solutions to the US.
The company has certified its ComsGate Payment Gateway to the First Data Rapid Connect platform, which enables Charge Anywhere to switch EMV transactions for merchants and acquirers in the US using the First Data Nashville, Omaha, Atlanta and South platforms.
Charge Anywhere’s series of encrypted point of sale (PoS) hardware devices are designed to accept EMV chip, chip and PIN, PIN debit and credit card payments, and are integrated to the Charge Anywhere software platform. The card payment solution can be implemented as a stand-alone solution or can be integrated into third-party software applications. A free software development kit is available to integrators.
Charge Anywhere uses the Miura Shuttle product line of EMV PoS terminals, which includes models M006, M007 and M010. They can be used with Android and Apple smartphones or tablets, and with Windows computers.
"We have successfully deployed tens of thousands of Miura Shuttle terminals in projects outside of the US, and we are confident that US merchants and acquirers will embrace this EMV PoS solution as the most complete and cost-effective product when upgrading their payment acceptance systems to accept chip cards and get the benefit of the EMV liability shift," said Paul Sabella, Charge Anywhere CEO.
The move is a good one for Charge Anywhere, which last year found previously undetected malware on its systems that may have allowed attackers to capture card details from as far back as 2009.
“The investigation revealed that an unauthorized person initially gained access to the network and installed sophisticated malware that was then used to create the ability to capture segments of outbound network traffic,” it said at the time. “Much of the outbound traffic was encrypted. However, the format and method of connection for certain outbound messages enabled the unauthorized person to capture and ultimately then gain access to plain text payment card transaction authorization requests.”
Photo © wavebreakmedia
Source: Information Security Magazine