Eliminating Risk at the Core

Credit card fraud is one of the most challenging issues facing card vendors, banks, credit card payment gateways - the entire industry. And let's not forget the pain and hurt falling victim to credit card fraud can mean for the business owner as well as the unfortunate card holder.

While the industry seems to want to focus on addressing symptoms, e-Path targets the very mechanics of how fraud happens - and then we terminate them by design.

"We received an order for a $799 digital camera. If we had stayed with a real-time gateway, the transaction would have processed automatically. e-Path allows us to check the details first, smell a rat, and save ourselves a fortune."

Root Cause #1: Merchant Account Vulnerability

The Problem Real-time payment gateways rely on your merchant account being open to them on the internet. Any anonymous individual can attempt a transaction into your business merchant account without your knowledge.
The e-Path Solution We remove your merchant account from the internet. Nothing is transacted unless you, the bank-approved merchant account and business owner, approves the online order and performs the transaction yourself.

Root Cause #2: Permanent Data Storage

Over 95% of data theft happens because highly sensitive and confidential information is permanently stored in online databases or within data storage appliances. Hackers target these "treasure chests" of card data.

The Problem Traditional real-time payment gateways store names, full card numbers and trasaction history data in databases or in data storage devices. When these are breached, potentially millions of accounts may be exposed.
The e-Path Solution e-Path does not permanently store credit card data, identity data or transaction data of any type within our systems. Once the merchant/business owner receives the payment details, it is as if the data never existed online.

Asymmetric Cryptography

We use both 2,048-bit and 4,096-bit RSA encryption - the same level of protection used by intelligence services, the military, banks, financial institutions and others. Each gateway has its own unique encryption system; data can only be decrypted by the specific merchant it was intended for.
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&9wksm))kdolem2ui+Nhfu4SEldOkdnka/xon+u8
Ii/TxMDqbc86Lzm94nklenswkxF8=
=tOdt

The data above is an actual encrypted card belonging to our founder, Peter Thwaites. It has been public on this website since 2007 and still remains 100% secure to this day. A bold and powerful demonstration of the encryption deployed by e-Path.

Security Over Automation

The trade-off with our service is automation. e-Path does not process credit card transactions on the open internet. This is the job of the merchant account owner/business owner; it is a manual process.