Trusted PalmPay – a palm-based biometric payment platform for Vietnamese banks

Publish date:

Trusted PalmPay - a palm-based biometric payment platform for Vietnamese banks
Mobile-ID Perspective · Vietnam Market · Trusted PalmPay

Trusted PalmPay: building bank-grade biometric payment infrastructure with Mobile-ID

This article analyses Trusted PalmPay from a product and technical architecture perspective — covering how Mobile-ID combines identity, biometrics, digital wallet and banking connectivity capabilities into a deployable platform, as well as the expansion strategy suited to the realities of the Vietnamese market.

Core message: Trusted PalmPay is not a standalone hardware project. It is an identity-driven payment platform that leverages CheckID, Trusted Pay, PKI/digital signatures, Open Banking integration and Mobile-ID’s server-side Palm Print/Palm Vein recognition system.
CheckID + Trusted Pay Palm Print / Palm Vein Wallet-First at POS Vietnamese Banking
Trusted PalmPay overall architecture
Trusted PalmPay overall architecture: biometric device · CheckID · Trusted Pay · Open Banking · banking systems.

Overview: from a payment feature to a platform capability

Trusted PalmPay is the infrastructure where identity, biometrics, digital wallets, point-of-sale payments and banking connectivity are joined into a seamless journey that can be deployed in practice rather than remaining a technology demonstration.

The core differentiator of Trusted PalmPay is its ability to combine device + server-side systems + trust controls + wallet economics into a product that is operational from day one, without dependency on a single hardware vendor.

What problem does Trusted PalmPay solve?

  • Reduces friction at the point of payment for high-frequency, repeat-use cases.
  • Creates an immediately visible innovation layer for banks at the point of sale.
  • Enables consistent deployment of loyalty programmes, wallet top-ups, POS data analytics and cross-selling.
  • Reduces reliance on mobile phones, QR codes or OTP at the counter.

What does Mobile-ID bring to this challenge?

  • CheckID — onboarding, identity verification, eKYC and identity lifecycle management.
  • Server-side biometric system — supports Palm Print/Palm Vein via Neurotechnology.
  • Trusted Pay — payment orchestration, POS connectivity, notifications and settlement data.
  • PKI / digital signatures — consent, mandate signing and bank-grade trust controls.
< 0.7 s
Device recognition reference benchmark
8 – 25 cm
Contactless recognition range
Wallet-First
Recommended transaction model at POS
Multi-Layer
Device · Identity · Payment · Banking

The Mobile-ID ecosystem in the Trusted PalmPay context

Trusted PalmPay’s advantage lies in the fact that Mobile-ID already has many foundational components that can be assembled into a complete architecture, shortening time-to-market and increasing credibility when engaging with a bank’s technical teams.

Mobile-ID Component Role in Trusted PalmPay Value delivered
CheckID Onboarding, eKYC, customer profile, biometric enrolment workflow, identity verification. Establishes an identity layer and trust layer from the very start of the customer lifecycle.
Server-side biometric system Template extraction, matching, scoring and policy signals for Palm Print/Palm Vein. Enables genuine biometric deployment rather than stopping at the capture device.
Trusted Pay Payment requests, POS connectivity, transaction status, refunds, dashboard and settlement data. Directly connects the biometrics challenge to payment acceptance and POS operations.
PKI / Digital Signatures Consent, mandate signing, API trust, device certificates and non-repudiation. Elevates trust and meets bank-grade operational requirements.
Open Banking Integration Top-ups, account linking, callbacks, reconciliation and settlement-related connectivity. Transforms the solution from an internal wallet into a capability embedded within the banking system.
Mobile-ID does not merely provide authentication technology. With CheckID, Trusted Pay, digital wallet, biometrics and trust controls, Mobile-ID can package a complete payment capability for banks — where identity, biometrics, payment orchestration and banking connectivity reside within a single, coherent architecture.

Overall architecture: why this solution is deployable

The Trusted PalmPay architecture is organised around a clear principle of layer separation. The device is responsible for capture, the server-side system is responsible for trust and transaction decisions, while the bank participates through funding rails and settlement.

Trusted PalmPay overall architecture
Figure 1. Trusted PalmPay overall architecture, comprising the palm recognition device, Device SDK / POS Connector, API Gateway, CheckID, biometric service, PKI, digital wallet, Trusted Pay, Open Banking Adapter and banking systems.

Device and edge layer

The palm capture device serves as the contactless input point. This layer is suited to self-service kiosks, SmartPOS terminals, counter POS and controlled environments. Captured data is sent through the Device SDK or POS Connector for local quality checks and encryption before transmission to the server-side system.

API Gateway and security layer

The API Gateway is the backbone layer for authentication, authorisation, mTLS termination, rate limiting, audit headers and routing. Without this layer, the biometric benefits upstream are weakened by uncontrolled transport and integration risks.

CheckID and biometric service

CheckID handles customer identity, eKYC/liveness detection, profiles and verification context. The biometric service manages Palm Print/Palm Vein matching, template management and server-side anti-spoofing/liveness policies.

Wallet, Trusted Pay and Open Banking

The Wallet & Ledger manages balances, holds, debits, credits and refunds. Trusted Pay handles payment orchestration and the risk/rule engine. The Open Banking Adapter connects to bank APIs for account information, fund transfers and payment initiation as required.

A key design principle in this architecture is separating the biometric domain from the wallet ledger domain. This reduces the blast radius of any incident, simplifies auditing and clearly delineates responsibilities across operational teams.

Deployment and trust zones: working with a bank’s CTO and security team

A compelling architecture diagram must demonstrate clear trust boundaries, the responsibilities of each deployment zone and how risk is controlled across the POS edge zone, the Mobile-ID platform, the integration zone and the banking zone.

Trusted PalmPay deployment and trust zones diagram
Figure 2. Deployment and trust zones diagram: POS/Edge Zone — Mobile-ID Secure Platform — Integration/DMZ Zone — Banking Zone.

Why do trust zones matter?

  • Reduces blast radius when an incident occurs in one layer.
  • Simplifies access control and access to sensitive data.
  • Clarifies the boundary of responsibility between the POS, Mobile-ID and the bank.
  • Easier to audit during security and compliance review sessions.

Recommended deployment principles

  • Treat devices as trusted endpoints requiring continuous verification, not unconditional trust.
  • Separate the biometric domain from the wallet ledger domain.
  • Keep critical transaction flows explicit and auditable.
  • Prioritise the payment path through the wallet at POS; the bank primarily serves top-up, settlement and reconciliation.

Transaction flow: how the payment experience is created

A palm payment experience is only convincing when the transaction flow is designed to be concise, clear and equipped with fallback options. A well-designed processing sequence must show both the customer journey and the server-side decision logic.

Trusted PalmPay payment processing sequence
Figure 3. Payment processing sequence: from the POS entering the amount and the customer presenting their hand, through palm verification and identity + wallet resolution, to authorisation/debit and the return of a payment confirmation.
Processing Step Business Description Technical Significance
POS enters amount The cashier enters the transaction amount on the POS terminal. Initiates a payment request on the POS side.
Customer presents palm The customer places their hand within the device’s recognition zone. The device captures a biometric dataset for transmission to the server.
Encrypted capture request The Device SDK / POS Connector sends an encrypted request. Protects biometric data before it enters the trust layer.
Routing and device verification The API Gateway authenticates the calling channel and routes the request. Controls device trust, session and security headers.
Template extraction and matching The biometric service performs palm extraction and matching. Returns the match result, score and policy signals.
Identity and wallet resolution The match result is linked to the customer profile and digital wallet. The step that connects customer identity to the transaction’s money movement.
Authorisation and wallet debit The Wallet / Trusted Pay approves and records the transaction. Reduces dependency on the bank’s real-time processing latency at POS.
Payment confirmation The result is returned to the POS and the customer. Closes the user experience loop in real time.
Deployment recommendation: This flow should follow a 1:1 verification first, 1:N identification later approach. This controls latency, reduces false-match risk and shortens the pilot timeline in the early stages.

Vietnamese market analysis and deployment strategy

Vietnam combines three favourable conditions for earlier adoption of palm payment than many other markets: established digital payment habits, a rapidly maturing digital identity infrastructure, and banks increasingly seeking payment models deeply integrated into their own ecosystems.

From QR codes to frictionless payment

QR codes have already educated the market on digital payments. The next step is reducing the number of actions at the counter for high-frequency, repeat use cases, where speed and convenience create a clear competitive advantage.

From eKYC to identity-driven payments

Having invested in building eKYC capabilities, the logical next step for banks is to reuse that identity capability for transactions, rather than limiting identity to the onboarding stage alone.

From innovation showcase to sustainable economics

Technology is only sustainable when tied to wallet balances, POS fees, loyalty programmes and cross-selling. Trusted PalmPay has an advantage because it can attach multiple value layers to a single transaction journey.

Recommended deployment roadmap

  1. Pilot in a controlled environment — university campuses, corporate canteens, hospitals or industrial zones. These environments have repeat users, are easy to measure and carry low operational risk.
  2. Wallet-first at POS — use Open Banking primarily for top-ups and settlement, avoiding dependency on the bank’s real-time processing latency at the point of payment.
  3. Selective POS rollout — prioritise locations with high payment throughput and a clear pattern of returning customers.
  4. Define success criteria upfront — active users, transaction success rate, false reject rate, top-up conversion rate and POS transaction throughput.
  5. Expand by value layer — payments first, then loyalty/membership, then cross-selling and data analytics.

Priority use cases

Use Case Why it fits The bank’s role
University campus / canteen High-frequency repeat users; pilot results can be demonstrated in a short timeframe. Funding rails, linked wallet, innovation brand positioning.
Hospital / clinic Identity and payment can be naturally linked within a single service journey. Bank account linkage, patient wallet, settlement reporting.
Corporate campus Clear B2B2C model; easy to integrate with payroll and employee services. Co-branded wallet, payroll linkage, corporate banking tie-in.
Retail chain High transaction volumes with strong loyalty and membership programmes. Merchant acquiring, promotional funding and data analytics.
The key to getting ahead is not deploying the technology as broadly as possible from the outset. It is creating controlled proof of success, then using that evidence to expand the POS network, grow wallet balances and help banks see the long-term value.

Reference glossary

A list of technical terms and system names used throughout this article.

CheckIDMobile-ID’s identity and eKYC product.
Trusted PayMobile-ID’s payment orchestration and processing product.
Palm PrintRecognition of palm surface vein patterns.
Palm VeinRecognition of subsurface palm vein patterns using near-infrared imaging.
PKIPublic Key Infrastructure — the framework for digital certificates and key management.
API GatewayThe backbone layer for authentication, routing and security across services.
mTLSMutual TLS — two-way authentication between client and server.
eKYCElectronic Know Your Customer — digital identity verification at onboarding.
DMZDemilitarised Zone — a network segment that isolates internal systems from external networks.
POSPoint of Sale — the location and system where a payment transaction occurs.
SDKSoftware Development Kit — a set of tools for building integrations with a platform.
Open BankingA model for sharing financial data between institutions via standardised APIs.
OTPOne-Time Password — a single-use authentication code.
B2B2CBusiness-to-Business-to-Consumer — a model where a vendor serves a business that serves end users.
1:1 VerificationMatching one biometric sample against one known profile.
1:N IdentificationMatching one biometric sample against an entire database of enrolled templates.

Conclusion

Trusted PalmPay should be positioned as a new payment and identity platform led by Mobile-ID — not a hardware feature or a standalone technology experiment.

The value of the solution stems from the fact that Mobile-ID already has all the components needed to turn “pay by palm” into a genuine operational capability: capture device, identity, biometrics, payment orchestration, digital wallet, trust controls and banking connectivity — all within a single, coherent architecture.

For the Vietnamese market, the right approach is to start with a controlled scope, measure rigorously and scale in phases. Once a bank can demonstrate that customers are willing to use identity-driven payment in a high-frequency, repeat-use environment, the remaining challenge becomes ecosystem expansion — no longer a question of whether the technology can work.

Community Discussion

Comments

Related Posts

Trusted IoT Connectivity & Tracking - a trusted IoT architecture for logistics, cold chain, and enterprise operations

Trusted IoT Connectivity & Tracking – a trusted IoT architecture for logistics, cold chain, and enterprise operations

Technical Blog v2 | In-depth Technical Style | Mobile-ID-standard Layout When logistics, cold-chain and container tracking enter real operational environments, customer requirements go beyond “the device can send data.” What…

GoPaperless CLMIAM – an integrated agentic AI platform for enterprise agreement and workflow operations

GoPaperless CLM/IAM – an integrated agentic AI platform for enterprise agreement and workflow operations

Technical Perspective · Next-Generation GoPaperless GoPaperless can evolve from a document workflow and digital signing portal into a Trusted Enterprise Work Platform — managing the full lifecycle of records, contracts,…

Quantera AI WorkSphere – on-premise AI agents for secure enterprise productivity and workflow management

Quantera AI WorkSphere – on-premise AI agents for secure enterprise productivity and workflow management

On-premise agentic AI productivity appliance Quantera AI WorkSphere is a secure on-premise agentic AI appliance engineered for enterprises that require governed document ingestion, AI-assisted drafting, department-level agent workflows, read-only system…

Quantera Platform - decentralized digital identity and EUDI-standard digital signature

Quantera Platform – decentralized digital identity and EUDI-standard digital signature

Technical Blog • Quantera Platform Quantera is positioned as a Digital Trust Infrastructure platform for enterprises, governments, and digital service ecosystems: where users control their identity, issuing organisations provide verifiable…

Trusted Delivery – trusted data exchange infrastructure for electronic transactions in Vietnam

Trusted Delivery – trusted data exchange infrastructure for electronic transactions in Vietnam

Trusted Delivery for Digital Vietnam As electronic transactions become the default, the question is no longer just “was it sent?” — but “who sent it, who received it, is the…

Trusted Billing - automate the Entire Invoice, Payment and Reconciliation Lifecycle for Your Business

Trusted Billing – automate the Entire Invoice, Payment and Reconciliation Lifecycle for Your Business

Mobile-ID Trusted Billing Billing-as-a-Service • Open Banking • e-Invoice • Automated Reconciliation A unified platform for billing, fee collection, and reconciliation Trusted Billing is Mobile-ID’s SaaS billing platform that brings…

Quantum Safe Card Architecture on Java Card – from Secure Chip to Enterprise Application Integration

Quantum Safe Card Architecture on Java Card – from Secure Chip to Enterprise Application Integration

In-Depth Technical Analysis A technical deep-dive into building a post-quantum digital signing product on smart cards — focusing on the secure chip, applet model, APDU protocol, CSP/KSP and CryptoTokenKit layers…

GoPaperless evolves into CLMIAM—from a digital signing portal to a full agreement lifecycle management platform.

GoPaperless evolves into CLM/IAM—from a digital signing portal to a full agreement lifecycle management platform.

Agreement Lifecycle Platform Overview In many organizations, digital signatures only address the final “checkpoint” of a document. Greater value lies in controlling the entire journey of an agreement — from…

FacialSense – advanced facial authentication spoof detection aligned with ISOIEC 30107-3

FacialSense – advanced facial authentication spoof detection aligned with ISO/IEC 30107-3

Biometric Identity & Presence FacialSense is introduced as a biometric platform designed to support multiple real-world use cases, including attendance tracking, presence management, visitor management, education, healthcare, hospitality, and mobile…

Post-quantum remote signing for long-term digital trust

Post-quantum remote signing for long-term digital trust

Quantum-Safe Remote Signing Ecosystem Mobile-ID positions a Quantum-Safe Remote Signing ecosystem for contracts, digital dossiers, enterprise eSeals, and evidentiary records—designed for organizations that require legal validity, auditability, and long-term retention.…

This website uses cookies

By clicking "Accept all", you agree to the storing of cookies on your device to enhance site navigation, analyze site usage, and assist in our marketing efforts.

Custom cookie preferences

These cookies are required for the website to function properly. They do not collect data for advertising purposes and cannot be disabled, as this would break the site's basic functionality.

Always active

These cookies remember your choices and settings to provide a more personalized experience, such as your selected language, dark/light theme, font size, region, or other customizations.

These cookies help us understand how visitors interact with the site. All data is fully anonymized and used solely to improve site performance, loading speed, and content quality—no personal identification.

These cookies enable us to show you more relevant ads on our site and across other platforms. They anonymously track your browsing behavior and prevent the same ad from appearing repeatedly.