GH GambleHub

Google Pay: in-app and web

1) What is Google Pay online

Google Pay (GPay) - a layer of secure payment over card rails (Visa/Mastercard/etc.), where the PAN is replaced by a device/network token (DPAN/network token), and the transaction is signed with a one-time EMV cryptogram. Authentication - biometrics/screen lock + device binding.
For the merchant, this is essentially a card CNP payment with increased conversion and less fraud. Disputes/refands - according to card rules.

💡 In certain regions (for example, India), Google Pay also acts as the "initiator" of UPI-intent. In this article, the focus is on online card payments (Web/In-App).

2) Channels and scenarios

2. 1 Web

Integration via Google Pay JS (PaymentDataRequest).
Works in modern browsers (the best UX is Chrome/Android).
Confirmation in the browser/through the associated device (phone/watch) with biometrics.

2. 2 In-App (Android)

Google Pay API for Android (native sheet).
Deep Link/App2App confirmation in GPay app, status return to your app.

2. 3 POS (NFC)

CP scenario via HCE/SE; outside of the online article, the chargeback rules are different.


3) Tokenization and security

DPAN/Network Token is issued by the network token service; The PAN does not leave the device.
For each payment, an EMV cryptogram (one-time signature) is formed.
SCA is closed by biometrics/screen lock of the device (PSD2-compatible).
Payment Token is decrypted at the PSP/gateway (gateway-mode) or at the merchant with the appropriate certificates (direct-mode; rarely).


4) SCA/3DS model and risk

In EC/PSD2, SCA is often performed at the Google Pay level → a separate 3DS may not start (bank/PSP decides).
The issuer/network may request additional verification/rejection of the transaction (especially for high-risk MCC).
Selective failures and reduced limits are possible for sensitive verticals.


5) MIT/recurrence and COF

Google Pay token for one-off transaction is not eligible for re-debiting.

For MIT/recurrents:
  • The first payment through GPay → obtain consent for MIT → tokenize the card in COF (Network Token/VTS/MDES) from the PSP/acquirer.
  • Further write-offs are like MIT with a COF token with the correct transaction markup.
  • Without COF and bank consent - high decline/chargeback risks.

6) Connectivity options: gateway vs direct

Gateway (recommended): 'tokenizationSpecification. type = "PAYMENT_GATEWAY"' → PSP decrypts the token and performs authorization. Fast start, less compliance.
Direct: 'type = "DIRECT"' → merchant independently decrypts the card network token. Need certificates/keys and the strictest security; rarely applied.

PaymentDataRequest (configuration core):
  • `allowedPaymentMethods` → `type: "CARD"`, `parameters. allowedAuthMethods` (`PAN_ONLY`, `CRYPTOGRAM_3DS`), `allowedCardNetworks`, `billingAddressParameters`.
  • `tokenizationSpecification` → `gateway` или `direct`.
  • 'tractionInfo '→ amount/currency/totalPriceStatus.
  • `merchantInfo` → `merchantId`/`merchantName`.

7) Integration flows

7. 1 Web (steps)

1. GPay client initialization → isReadyToPay check.
2. Collection of PaymentDataRequest (with networks, authentication methods and tokenization).
3. Display GPay Sheet → user confirms (SCA).
4. Receive paymentMethodData (cipher token) and send to PSP.
5. Ответ PSP: `authorized/succeeded/failed` + webhook.
6. 'Capture/refund' by need; recon - by daily registers.

7. 2 Android (in-app)

Similarly, create a'PaymentsClient ', pass a'PaymentDataRequest', get a token and pass it to the backend/PSP.


8) Statuses, settlements and returns

Online statuses: 'authorized/succeeded/failed/cancelled' (+ 'pending' in some PSPs).
Settlement: by PSP/acquirer registers, usually T + 1/T + 2. Separate online success and accounting enrollment.
Refund: partial/complete by card rules.
Chargeback: the card procedure (INR/NAD, etc.) remains relevant.


9) Frequent failure causes (declines)

MCC/vertical (iGaming/quasi-cache) - selective blocking for issuers/PSP.
Mismatch geo (map country/IP/merchant location).
Incorrect'PaymentDataRequest 'configuration (networks/authentication methods), incorrect' merchantId'or tokenization mode.
MIT without COF/consent.
SCA Timeouts/User Flow Interrupt.


10) UX patterns (which boosts conversion)

Mobile-first: bring out the Google Pay button first method on Android.
Large GPay button on the product card/basket/checkout; follow the brand guide.
Pre-fill amount/taxes/delivery to Sheet (user-visible total).
Recovery: safe repetition at timeouts, switching to cards/A2A at repeated failures.
Desktop↔mobayl: QR/hand-off if the user confirms on the phone.


11) Smart routing

Offer GPay on Android/Chrome and for BINs/banks with a high approve rate.
Auto-derating GPay on specific BIN/geo when indicators are degraded.
For recurrents: first payment via GPay → COF, then MIT without user intervention.


12) Safety and compliance

Validation of PSP message signatures/web hooks, strict 'redirect/return' URIs.
Keys/secrets - in vault, IP-allowlist for callback-endpoints.
PCI footprint is minimal in gateway-mode (you don't touch PAN/secrets).
Logs: device hints, reason codes, SCA/confirm time.


13) iGaming: Features

Availability and limits vary by jurisdiction, PSP and issuer.
Expect selective failures and/or reduced limits; check local rules.
Recurrent write-offs - only MIT with COF and documented player consents.
Keep alternatives: A2A/open-banking, local wallets, eCash. Enter fallback if the decline is high on GPay.


14) Reconciliation and reporting (recon)

Log in:
  • 'paymentId/transactionId ', 'orderId', network (Visa/MC/...), BIN/bank, amount/currency, status/refusal codes, channel (Web/In-App), timestamps, ARN/UTR from registries.

Daily auto-recon + periodic full-recon.

Alerts: "online success without a registry," "double capture," "aging auth."


15) KPI and method management

Approval rate GPay vs regular cards (by banks/BIN/geo/devices).
Share of GPay in Android traffic, 'retry win-rate'.
Decline matrix (reason codes), доля SCA timeouts.
Chargeback rate/ODR, settlement lag, доля partial refunds.
Auto-deriving threshold rules (for example, approve <X% for a specific BIN/geo).


16) Output checklist

1. Connect GPay at PSP; get merchantId, configure allowedPaymentMethods/networks and tokenizationSpecification.
2. Implement Web/In-App Sheet, 'authorize/capture/refund', webhooks (signature/NMAS), idempotency and retrays.
3. Configure COF/network tokenization for MIT + store consent.
4. Enable smart-routing: GPay priority on Android, fallback on cards/A2A.
5. Checking brand guides (buttons/icons/copyright).
6. Build recon and alerts: out of sync, aging auth, double capture.
7. E2E tests: Web/Android, partial capture/refund, timeouts/replays, PSP degradation, high loads.


Landmark card

Rail: card (Visa/MC/...); chargeback - according to the rules of cards.
SCA: biometrics/screen lock (PSD2-compatible); 3DS is usually not required separately.
Tokenization: DPAN + EMV cryptogram; for the recurrent - COF/network token.
Статусы: `authorized/captured/succeeded/failed/refunded/voided`.
Settlement: by PSP registers (T + 1/T + 2).
Limitations: availability by device/browser/geo; for iGaming - PSP/issuer policy.


Resume Summary

Google Pay is a card payment accelerator with high mobile conversion and built-in SCA. Integrate via gateway-mode, meet PaymentDataRequest requirements, build around webhooks + idempotency + recon, and use COF for recurrents. For iGaming - keep alternative rails and smart routing as availability and limits vary by jurisdiction, bank and PSP.

Contact

Get in Touch

Reach out with any questions or support needs.We are always ready to help!

Start Integration

Email is required. Telegram or WhatsApp — optional.

Your Name optional
Email optional
Subject optional
Message optional
Telegram optional
@
If you include Telegram — we will reply there as well, in addition to Email.
WhatsApp optional
Format: +country code and number (e.g., +380XXXXXXXXX).

By clicking this button, you agree to data processing.