Sharing our experience to educate others.

Here’s an infographic from to explain how credit card companies make their money. (Click to enlarge) Enjoy!

Credit Money
Via: Credit Score

My boyfriend and I went out to dinner last Saturday night, and enjoyed an amazing meal. I truly recommend The Maritana Grille in St. Pete Beach, FL.

When it was time to pay the bill, my boyfriend pulled out his trusty debit card. The waiter saw the card and brought an old-school manual imprinter over to our table. He apologized, and explained that their terminal was down. We “chuckled” along with him, mostly at the sight of such an old piece of equipment.

It’s pretty cool to think about how much the technology behind credit card processing has advanced. As consumers, we rarely (if ever) stop to think about what happens behind the scenes of a purchase. Many technical steps occur in the few seconds between handing a merchant your credit card and walking away with your purchase.

Here is a (simple) breakdown of the process. (If you need help with vocabulary, see the glossary below):

1. You walk up to the checkout counter with the items you’d like to purchase.

2. Either you or the checkout employee swipes your credit/debit card, or enters the numbers manually.

3. An “Authorization Request” is generated.

4. The Processor links up with the Visa/MasterCard network in order to transmit the Authorization Request to your bank.

5. Your bank verifies that your card is valid, and that you have the funds to complete the transaction.

6. A “hold” for that amount is placed against your account.

7. Once the approval is received a “Deposit Transaction” is transmitted which finalizes the transaction.

8. You walk away with your purchased items.

9. The Net Settlement Amount is deposited to the Merchant’s account, usually by the end of the same business day.

Remember… all of the above happens in a matter of seconds. My boyfriend’s account was debited yesterday (Thursday), for the meal we’d eaten 5 days earlier (Saturday). With technology, we’ve gone from 5 days to 5 seconds. Crazy!

(Glossary from

– Payment Processor: Responsible for contacting issuing banks or credit card associations on behalf of the merchant account provider to request authorization and settlement of credit card transactions.
– Authorization Request
: A message sent through FDMS to an issuing bank or credit card association to verify the cardholder has sufficient funds available for the transaction. If the transaction is approved, then a response is sent back to Yahoo! from the issuing bank or credit card association through FDMS.
– Issuing Bank
: Any Visa/MasterCard member bank, which issues cards to cardholders. The issuing bank collects funds for purchases from the cardholder.
– Deposit
: The amount credited to a merchant’s bank account from the settled transactions in a batch, minus any fees.
– Settlement
: A process in which a transaction is processed between a merchant account provider and the issuing bank or credit card association of the buyer. In the case of a sale, funds are transferred from the issuing bank/card association to the merchant’s account. Merchants can review the details of each settlement by reviewing batches.

Myth Busters wanted to do a show on RFID: how hackable, how reliable, how trackable, etc. The show never aired. Here’s why… (You only need to watch the first 2 minutes.) Enjoy!


Just sayin’.

I just read an article on, and learned of the (in)security of RFID credit cards.

As the article states,

RFID stands for “radio frequency identification.” In a nutshell, an RFID credit card has an electronic tag and antenna embedded that transmits the payment information to a reader. This same technology allows you to wave your gas card at the pump to earn rewards or drive through a tollbooth with your E-ZPass.

Author Jennifer Rose Hale goes on to discuss the security risks of using an RFID credit card. She mentions that it’s convenient and quick to pay with these new cards, but asks, “How secure are they really?” Anyone can buy RFID readers, and they are inexpensive. A reader can capture your credit card number in the same way the store clerk does – through radio frequency. Hale poses the question, “As you’re waving your card around, just how much should you be worrying about someone behind you – or behind the counter – secretly scanning and stealing your credit card data?”

The answer: anyone with a reader who is within 2 to 4 inches of you can steal your credit card number, and he or she has a window in which to use your numbers. “That’s because the transmission generates a unique code, which is discarded the next time you use the card.” One major positive: RFID chips don’t transmit sensitive information such as your card’s security code or your address or phone number.

Ok, so someone might have a little bit of trouble getting 2 to 4 inches from you, stealing your card information with his or her RFID reader, and then using your card in the window of time available before you make your next purchase. But, do you want to take that chance?

You won’t have to, once credit card companies implement SAFE® Technology. You’ll be able to lock your cards immediately after using them, and unlock them right before you make another purchase. Even if someone were to steal your card information, he or she wouldn’t be able to use it. Besides locking your card, you can also request a new CVV code for every single purchase. All you have to do is send a text message via SMS and you’ll receive a new code for your card. The old one that you used for the last purchase (even if it was 10 seconds earlier) is thrown out the window. It doesn’t matter how close someone gets to you, or how long you wait to make your next purchase. No one will have access to your card but you. Combining these two features makes your card virtually fraud-proof.

In her article, Hale also points out that stores don’t want their employees to have possession of your card, even if you can watch their every move. Almost all terminals have been placed on the opposite side of the register, giving consumers the control of swiping their cards and keeping it in their hands. So, as for the security of keeping your card in your wallet, it seems to me that it’s safer to swipe it, lock it, and put it away than it is to leave it in your wallet, available to crooks to use during “spending window.”

And really… considering that the technology is named SAFE®, how could you trust anything else?

What are your thoughts? Would you like to use a card equipped with SAFE® Technology?

“Traffic jam when you’re already late. A no-smoking sign on your cigarette break. 10,000 spoons when all you need is knife…” Promoting SAFE® Technology and getting your credit card information stolen…. Oh, that’s not the ending of the song? Well, that was the “ending” for an employee here at M2. Isn’t it ironic?

M2 has developed the safest card in the world, and one of our employees chose to use his bank-issued debit card instead while out to brunch with some friends; long story short, someone skimmed his card and by the very next day he’d been charged for purchases in Texas, Chicago, New York, and Miami. (We’re in Saint Petersburg, FL.)

It’s incredible (incredibly unfortunate) just how quickly someone can steal from your bank account. You probably think that there’s no way it could ever happen to you, right? But the chances that it will happen to you are rising. The number of U.S. identity fraud victims increased 22 percent in 2008 to 9.9 million adults, and the total annual fraud amount jumped 7 percent to $48 billion.

Don’t worry; there is a solution. In order to drastically reduce fraud all around the world, preventing the annual loss of billions of dollars, M2 is now leasing SAFE® Technology to all major credit and debit card companies.

SAFE® (Secure Access for Ecommerce) is a technology that allows consumers to request a unique CVV code for every new purchase. Using this security is like using a new card every time you make a purchase. A new code is automatically generated and sent to cardholders via text message or email. These dynamic codes are transaction specific, and expire after each use.

Not only can you use a new code for each use, but you can also lock your card via SMS (Short Message Service) between transactions.

Here’s an overview of more groundbreaking features:
• Use card equipped with SAFE® Technology anywhere your major credit or debit card is accepted.
• Request a new CVV code for every transaction.
• M2’s patented Geotag® location database validates your IP registration information for every transaction.
• Lock your card to prevent fraudulent charges.
• Unlock your card and use instantly.
• Receive text messages or email alerts with balance information
• Make secure purchases and card-to-card transfers
• Instantly send and receive funds to and from the other side of the world, 24/7
• Transfer funds from card to card instantly
• Change PIN, CVV, check balances and send money all by text message
• Access your accounts online or through a mobile app

The best part? We operate on a “cloud” infrastructure, so it will be very convenient for all major credit and debit card companies to implement SAFE®. As a consumer, you won’t have to order a new card. Keep the card you have, and when your credit or debit card company licenses SAFE®, you’ll automatically have access to the most sophisticated security features available anywhere. Your card will become virtually fraud proof.

All major credit card companies now have the ability to offer this security and control to their consumers, and have the opportunity to increase security and convenience throughout the entire industry.

Giving the power of card security to the cardholder will change the credit and debit card industry forever.

NOTE: The United States Patent and Trademark Office awarded M2 with a patent for SAFE® in May 2011.

For more information please contact M2 President Ryan Colgrove
727-498-1036 – office     |     727-460-8185 – mobile