Verification card mapping notification

Introduction

Verification card mapping notification is initiated through HTTPS POST request by using URLs and the parameters.

Card mapping notification is used to allow Consumer credentials (phone, email, billing address, twitter name, etc) for mapping to card data. Card mappings can be used later in transfer or sale transactions instead of card numbers and other cardholder information. Billblend sends Verification card mapping notification request to Connecting Party’s server/proxy with created on its side card reference – {serverCardId}.

Connecting Party’s server maps this {serverCardId} to {clientCardId}, created on its side. This {clientCardId} can then be mapped in Connecting Party’s app or on Connecting Party’s server to any Consumer’s data from the initial Perform validation request. This allows Connecting Party’s app to process sale or transfer transactions by Consumer’s email, phone number, etc.

{uniqueReferenceCardId} remains the same if Consumer makes another verification with the same card number but different expiry date, for example. It can be used by Connecting Party for loyalty programs or fraud control.

API URLs

Connecting Party Server
https://proxy.connectingpartyserver.com/verification/notification

Request Parameters

Parameter NameDescriptionValue
consumerTypeObject
consumer.deviceTypeObject
consumer.device.serialNumberConsumer’s device serial number.Type: StringLength: 1-50
referenceTypeObject
reference.serverCardIdThe card reference identifier (on server side).Type: StringLength: 1-64
reference.uniqueReferenceCardIdThe card identifier (on server side).Type: Integer
sessionTypeObject
session.accessTokenConsumer’s access token key.Type: StringLength: 32-128
session.tokenThe session token of verification transaction.Type: StringLength: 16-36
sourceCardTypeObject
sourceCard.binThe Source card BIN.Type: Integer

Success Response Parameters

Parameter NameDescriptionValue
invoiceIdVerification transaction identifier.Type: String
sessionTypeObject
session.checkSignatureChecksum generated by hmac-sha1 (see Signature computation) from the concatenation of the session.nonce, the endpointId and the invoiceId.Type: String
session.nonceUnique random string generated by Connecting Party’s server.Type: String
session.tokenThe session token of verification transaction.Type: String

Fail Response Parameters

Parameter NameDescriptionValue
errorTypeObject
error.causeCause of the error. Possible values: FILTEREDINVALID_REQUESTSERVER_FAILEDSERVER_UNAVAILABLE.Type: Enum
error.codeThe unique error code.Type: String
error.messageDescription of the error.Type: String
invoiceIdVerification transaction identifier.Type: String

Request Example

{
  "consumer": {
    "device": {
      "serialNumber": "string"
    }
  },
  "reference": {
    "serverCardId": "string",
    "uniqueReferenceCardId": "integer"
  },
  "sourceCard": {
    "bin": "integer"
  },
  "session": {
    "accessToken": "string",
    "token": "string"
  }
}

Success Response Example

{
  "invoiceId": "string",
  "session": {
    "checkSignature": "string",
    "nonce": "string",
    "token": "string"
  }
}

Fail Response Example

{
  "error": {
    "cause": "enum",
    "code": "string",
    "message": "string"
  },
  "invoiceId": "string"
}

Contact us

By clicking on the button, you agree to the data protection policy

Complete the quiz

By clicking on the button, you agree to the data protection policy