API Reference

⚡Performance & Best Practices

Optimize approval rates and enhance user experience with effective integration techniques

🧩 Data Only

Data Only is a solution that enables a more efficient and precise exchange of information between merchants and issuers.
It consists of a data enrichment process within the 3DS (3D Secure) flow, where only transaction data is sent to the card issuer — without requiring cardholder authentication (such as password entry or biometric verification).

🔍 Key Insights

This approach allows issuers to proactively receive transaction-originated data such as:

  • 🌐 IP address
  • 💻 Device identification details
  • 📱 Information on whether the purchase was made via app or browser

Additionally, issuers receive a Visa risk score, which helps verify the cardholder’s identity at the time of authorization — ultimately increasing the likelihood of payment approval.


🔐 3DS (3D Secure)

3DS (3D Secure) is an authentication protocol used in online card transactions, designed to reduce fraud and increase security in digital purchases.
It allows the issuing bank to validate the cardholder’s identity during the transaction — with or without active authentication (e.g., SMS code, facial recognition, or biometric).


⚖️ Comparison: Data Only vs Full 3DS

Feature🧩 Data Only🔒 Full 3DS
Risk Assessment✅ Improves transaction risk assessment✅ Higher overall transaction security
Customer Experience💨 Frictionless, no extra steps⚠️ May include challenge (e.g. OTP)
UsageIdeal as pre-step before 3DSMandatory in regulated markets
Conversion Impact🚀 Enhances conversion rates⚖️ Depends on authentication success
Debit Transactions✅ Possible without cardholder auth🔐 Requires authentication
Chargeback Liability🏪 Merchant🏦 Issuer (liability shift)

💡 Suggested Strategies

1. Combine Data Only + 3DS + Anti-Fraud

Use the anti-fraud tool to pre-screen risk, apply Data Only to enrich issuer analysis, and escalate to full authentication (Challenge) when necessary.

2. Risk-Based Segmentation

Apply full 3DS only to higher-risk transactions and use Data Only for trusted customers or behaviors.

3. A/B Testing

Experiment with different authentication approaches to measure their impact on conversion and approval rates.

4. Continuous Monitoring

Track approval, fraud, and conversion KPIs to continuously improve your authentication strategy.


🔁 Network Token — What It Is and Why It Matters

A network token enhances the security of online transactions by replacing real card details (number, CVV, expiration) with an encrypted code.
This tokenization process is managed by a Token Service Provider (TSP) that generates a unique token per transaction or device — making fraud significantly harder.

⚙️ Benefits

  • 🔄 Data Replacement: Sensitive card data is replaced by a random, encrypted sequence.
  • 🛡️ Enhanced Security: Each token is unique per transaction or device — if leaked, it’s unusable.
  • 📈 Higher Approval Rates: Tokenized transactions are perceived as safer by issuers and card networks.
  • 🧭 Better Experience: Enables fast, frictionless checkouts since users don’t re-enter card details.

🛡️ Anti-Fraud & Device Fingerprint

The A55 Anti-Fraud & Device Fingerprint module helps merchants boost approval rates and minimize fraud — all without external dependencies.

It seamlessly integrates into the payment flow, applying real-time, intelligent risk analysis while maintaining a frictionless checkout experience.

🔬 Our Risk Engine Analyzes:

CategoryData Points
Device SignalsFingerprint, IP address, user agent, screen info
Behavior & VelocityRepeated attempts, value jumps, multiple card use
Payment AttributesBIN, amount, MCC, currency, installments
Customer MetadataEmail, phone, address consistency
History & ReputationInternal allow/deny lists, dispute history

🤝 Support

Our Performance Team is available to help design a tailored optimization strategy in collaboration with your commercial contact.


📘 Integration Documentation

You can access the full integration documentation through the links below.
The process is straightforward, and our Integration Success Team is ready to assist you throughout the implementation.


🧠

Pro Tip:
Combine tokenization, Data Only, and Anti-Fraud modules to maximize security and approval performance — while maintaining a seamless checkout experience.