Google Pay のサポートを追加する作業は標準のプロセスと変わらないように見えますが、Google Pay 統合プロジェクトを成功させるには、多くのことを判断しなければなりません。技術的な選択を安易に行うと、ユーザーに負担をかける可能性があります。統合を計画する場合は、ユーザー エクスペリエンスを常に意識することが重要です。ユーザーのウォレットにカードを追加して管理する方法を改善することで、トークン化の成功率を上げ、顧客エンゲージメントを深めることができます。また、カスタマー サービスへの問い合わせを大幅に減らし、Google Pay を通じてブランドを強化できます。
Google Pay API との統合
Google Pay には API が用意されているため、顧客と Google ウォレットのやり取りをより厳密に管理できます。Push Provisioning API を使用すると、Google ウォレットの機能を独自のバンキング アプリやウェブサイトに追加できます。世界中の多くのカード発行会社が、運用の複雑さを解消し、独自の HCE ウォレットで発生するコストを削減するために、Push Provisioning API との統合を選択しています。
All rights reserved. Java は Oracle および関連会社の登録商標です。
最終更新日 2025-08-22 UTC。
[null,null,["最終更新日 2025-08-22 UTC。"],[[["\u003cp\u003eImplementing Google Pay involves key decisions that impact user experience and integration success, such as optimizing card addition and management for higher tokenization rates and customer satisfaction.\u003c/p\u003e\n"],["\u003cp\u003eLeverage Google Pay APIs, like the Push Provisioning API, for enhanced control over customer interactions and streamlined wallet functionality within your banking app.\u003c/p\u003e\n"],["\u003cp\u003eOptimize ID&V processes by incorporating risk signals, tailoring ID&V methods to risk levels, and utilizing RCS for SMS OTP delivery to enhance security and user experience.\u003c/p\u003e\n"],["\u003cp\u003eRelinking tokens when FPANs change, such as card expirations or replacements, preserves active tokens, updates card details in Google Pay, and provides a seamless experience for users, avoiding re-tokenization.\u003c/p\u003e\n"]]],["Integrating with Google Pay APIs, particularly the Push Provisioning API, optimizes user experience and reduces costs. Key actions include: prioritizing \"green path\" tokenization, encouraging instant issuance, and prominently featuring provisioning. Employ diverse ID&V methods, tailored to risk levels, and leverage risk signals to reduce fraud. Use RCS for SMS OTP and provide app-based verification links. Relink tokens to new FPANs when cards are replaced to avoid re-tokenization for users.\n"],null,["# Best practices\n\nAdding support for Google Pay may seem like a standard process, but there\nare many decisions you need to make that impact the success of your\nGoogle Pay integration project. Technical shortcuts may place additional\nburdens on your users, so it's important to keep user experience in mind when\nplanning an integration. By looking for opportunities to optimize how your\ncards are added and managed in the user's wallet, you'll enjoy higher\ntokenization success rates, greater customer engagement, significantly fewer\ncustomer service calls, and represent your brand well through Google Pay.\n\nIntegrate with Google Pay APIs\n------------------------------\n\nGoogle Pay offers APIs that enable you to more tightly manage how your\ncustomers interact with Google Wallet. The [Push Provisioning API](/pay/issuers/apis/push-provisioning/android)\nlets you add Google Wallet functionality to your own banking app or website.\nMany issuers around the world have chosen to integrate with our\n[Push Provisioning API](/pay/issuers/apis/push-provisioning/android) to reduce operational complexity and save costs arising\nfrom running their own HCE wallet.\n\n### Push Provisioning API best practices\n\nTo optimize your [Push Provisioning API](/pay/issuers/apis/push-provisioning/android) integration, Google recommends\nincorporating the following best practices:\n\n1. [Green path](/pay/issuers/apis/push-provisioning/android/best-practices#green_path): Green path push provisioning tokenizations, if possible.\n\n2. [Instant issuance](/pay/issuers/apis/push-provisioning/android/best-practices#instant_issuance): Encourage users to add to Google Wallet while waiting\n for the physical card.\n\n3. [Prominently feature the ability to push provision](/pay/issuers/apis/push-provisioning/android/best-practices#prominent): Publish banners in\n your app to promote push provisioning and make the provisioning button\n accessible.\n\nFor further details, refer to [Best practices for push provisioning](/pay/issuers/apis/push-provisioning/android/best-practices).\n\nID\\&V best practices\n--------------------\n\nGoogle supports a range of [ID\\&V methods](/pay/issuers/tsp-integration/tsp-config#identity_and_verification_idv). Well thought out and high performing\nID\\&V processes yield token activation rates of\n**+90%** on Google Pay (see list of ID\\&V\nmethods [in order of activation rate](/pay/issuers/tsp-integration/tsp-config#supported_yellow_path_idv_methods)). The purpose of ID\\&V is to prevent\nfraudulent activity on the device, but, in practice, many legitimate users are\nalso lost at this step. Any legitimate users lost during ID\\&V aren't able\nto use your card in Google Pay and are forced either to use another\nissuer's card in Google Pay or resort to physical cards. Making a little\nextra investment up front to support a more diverse set of ID\\&V options pays off\nsignificantly in terms of adoption, security, and reduced support calls.\n\n### 1. Make the most of risk signals\n\nGoogle provides various risk signals and recommendations, including\nbut not limited to [account and device risk scores](/pay/issuers/tsp-integration/tsp-config#risk_scores_and_recommendations), through each of the TSPs.\nThe specific signals depend on the TSP and the data they provide to you. These\nsignals can significantly reduce the risk of fraud without requiring any\nadditional interaction by the customer. This data in addition to the\n**issuer's risk engine** allows the issuer to determine the right ID\\&V\napproach to offer the user for each provisioning request. For example:\n\n- Most issuers reserve the\n ****red path**** for an unacceptable risk\n rating, which is typically a very small fraction of attempts.\n\n- Most issuers send manual provisioning attempts to\n ****yellow path****, except when it is a\n trusted device (e.g. setting up a new phone when the old phone already had a\n device token).\n\nSpeak to your TSP for more details about the fields they can provide to optimize\nyour risk assessment.\n\n### 2. Match ID\\&V options to risk level\n\nIssuers can tailor the [ID\\&V methods](/pay/issuers/tsp-integration/tsp-config#identity_and_verification_idv) offered to the user based on its\n[account and device risk scores](/pay/issuers/tsp-integration/tsp-config#risk_scores_and_recommendations). For example, for high-risk attempts, issuers\ncould choose to offer the methods that they consider offer the highest security.\nWhereas for lower-risk attempts, offering the full suite of ID\\&V methods could\nbe fine.\n\n### 3. Use RCS for SMS OTP\n\nIssuers can ensure the OTP is sent using Rich Communication Services ([RCS](https://support.google.com/messages/answer/9487020)).\nRCS chats can provide an upgraded, rich messaging experience offering more\nsecurity (i.e. messages sent between sender and user are encrypted, sender ID\nand verified badge in app header). RCS is also available over both Wifi and\nmobile data.\n\n### 4. Using SMS OTP to redirect the user through their banking app\n\nWhilst [App to App verification](/pay/issuers/tsp-integration/app-to-app-idv) is available and would involve less friction,\nas an alternative issuers can also include a link in the SMS OTP for the user to\nlog into their banking app. Once in their banking app they have the option to\ncomplete enrolment, or the actual OTP is shown (i.e. in notifications /\nmessages). This OTP is then used to complete Google Wallet provisioning.\n\n### 5. General messaging best practises for SMS OTP and Email OTP\n\n- If using SMS OTP, adopt [RCS](https://support.google.com/messages/answer/9487020) to offer a richer messaging experience.\n- Clearly mention that this is an attempt to add a card to Google Wallet.\n- Reinforce to the user not to share this number with anyone.\n- Send an additional confirmation SMS/email/app notification to the user when their card is added to Google Wallet. Include details for how the user can quickly flag \\& escalate (i.e. if they did not provision the card themselves).\n\n### 6. Alternative ID\\&V methods which enable issuers to achieve SCA compliance\n\n[App to App verification](/pay/issuers/tsp-integration/app-to-app-idv) and **Web-based secure authentication**\nhosted by your TSP (see illustration below), are also options to achieve [SCA](/pay/issuers/overview/region_specific/sca)\ncompliance.\n| **Note:** The Web-based secure authentication method is only available for Visa customers at this time.\n\nRelink tokens when FPANs change\n-------------------------------\n\nWhen FPANs change, any device tokens for that card can be updated to link to\nthe new FPAN. The update keeps the token active and updates the last four\ndigits of the FPAN shown in the Google Pay UI. The update can optionally\nupdate other metadata attributes like card art. This capability is often\noverlooked, even though it provides great customer benefit.\n\nFor example, when a customer's card expires and a replacement is reissued, the\ntoken created with the old card can be updated to link to the new FPAN. This\nmeans users do not need to go through the hassle of re-tokenizing their card\nand potentially being faced with a new yellow path ID\\&V challenge.\n\nSimilarly, when fraud is detected on the account, it is usually not related to\nthe token on the user's device. It is typically concentrated to the physical\ncard or a single token. If the fraud happened on the physical card, the old\naccount can be cancelled and replaced with a new account. Here too, you can\nprovide a great customer experience by relinking the token to the new FPAN\nso they can use the token while they wait for the replacement card in the mail.\n\nFor more information on how to implement token repointing, speak to your TSP."]]