Login | Register

BOKU online payment system


Updated on September 30, 2011
Views: 12715 | Clicks: 324

Website Screenshot

General Information

BOKU is the world leader in online payments, enabling consumers to buy goods and services with nothing more than their wireless phone number. We reach over 3 billion consumers all over the world. Trusted by consumers, merchants and carriers, BOKU is highly accessible and uses bank-grade payment technology to create a whole new market for mobile users who otherwise might not be reached.

We are localized across 28 languages and 44 currencies, operating in 65 countries with 230 carriers across the globe. (That means you don’t have to learn 27 new languages.) BOKU is headquartered in San Francisco with offices in Europe and Asia. Our investors include leading Silicon Valley entrepreneurs and venture capitalists such as Andreessen Horowitz, Benchmark Capital, DAG Ventures, Index Ventures and Khosla Ventures


USD - US Dollar

Countries of use

All countries


private and business

Integration approaches

online mobile

Information for developers

Integrate with BOKU’s pricing API,
transaction API or Android SDK.
Integrating BOKU is as easy as 1-2-3 and as you can see, we mean that literally.

Step 1.Use BOKU’s Publisher
Portal and submit a new
service for approval.
Step 2.Integrate with BOKU’s
pricing API, transaction API
or Android SDK.
Step 3.Test and ship!
Get Started with BOKU
AndroidIntegrating BOKU’s 1-Tap™ solution into your Android application enables you to monetize via carrier billing in 50+ countries. Drop our SDK into your application, make one simple call, and we take care of everything, from localization to payment authorization. For your end-user, with one tap of a button, the transaction completes within seconds without ever leaving the application.
Get Started!
WebIntegrate BOKU’s web checkout solution online to accept mobile payments in 65 countries, localized in over 30 languages. Just call our API to start a transaction online, and we’ll return a URL to you that can be displayed in an iframe or separate web page. Send the user to this URL, and our highly optimized web checkout flow will complete the transaction. For the user, it’s as simple as: 1) choose what you want to buy, 2) enter your mobile phone, 3) receive a confirmation text and reply with the letter “y.”
Get Started!
With you every step of the wayFrom the moment you fill out your merchant registration form, our business development and compliance teams take over and start working with you to create a BOKU publisher portal account. Our Merchant Support Team then takes over and enables special configurations based on your compliance needs. The MST team then works with you as you integrate BOKU into your product and then submit for approval. Once MST approves your service, you’re all set and ready to use BOKU.
As flexible as you need us to beIntegrating with BOKU API’s is flexible and easy. The main API’s required are pricing and transaction initiation API’s. The pricing API just queries available price points. The transaction initiation API starts a transaction with a given price point. Working with our Android SDK might be even easier. Just drop a few lines of code into our jar file, integrate the standard pricing API and you’re good to go.
Protecting you and your customers from fraud with our proprietary process and platformWhen you work with BOKU, our expert fraud management team is working in parallel with the Merchant Support Team to ensure that we’re keeping you and your customers safe from fraudulent transactions. Our fraud management team is on the job from the start, from merchant checkpoints and end-to-end flow tests used while you are integrating BOKU, to payment notifications, to the documentation we provide outlining product security best practices. In short, fraud is bad, but we’ve got you covered.
Our expert staff is made up of…well, expertsIf you get stuck or have questions, we’ve got unparalleled customer service to give you the comprehensive support necessary to keep your customers satisfied and your business successful. Because we just want you to do well. Is that so much to ask? BOKU is a trusted industry leader in technology, finance, and engineering. And not to brag or anything, but the people behind BOKU are veterans from companies such as Amazon, Google, PayPal, Yahoo, Apple, Bank of American, First USA and AT&T. We just wanted to let you know. No big deal.

Recent news

Posted on September 25, 2019
Do SMS OTPs Solve Strong Customer Authentication (SCA)?

This week, the Financial Conduct Authority (FCA) confirmed the phased roll-out of PSD2 SCA within the UK. As part of this phased approach, it is envisaged that as of March 2020, merchants will be allowed to introduce 2-Factor Authentication as an approved method to achieve SCA compliance. However, to ensure full compliance, merchants must ensure their plans are completely in place by March 2021.

The introduction of SCA by the EBA (European Banking Authority) is expected to reduce the levels of financial fraud online, which significantly impacts the global e-commerce marketplace. However, due to concerns about the ability of Issuers, Acquirers, Gateways and Merchants to deploy 2-Factor Authentication by the original 14th September 2019 deadline, the FCA has agreed to allow the use of EMVCo 3DS 2.+ (Risk Based approach) alongside one form of authentication. SMS OTP is the primary form of authentication suggested by the FCA due to the potential availability to consumers.

Is SMS OTP the Mag Stripe of the e-Commerce World?

There are meaningful concerns within the e-commerce world around the security of SMS OTP, particularly with regard to social engineering and hacking vulnerabilities. The SMS delivery mechanism – sending a message directly to a consumer’s phone – introduces a new vector that fraudsters can attack to take over individual consumers’ accounts and commit fraud. Read full post

The post Do SMS OTPs Solve Strong Customer Authentication (SCA)? appeared first on Boku Inc..

Read more on BOKU
Posted on September 11, 2019
Jack got Hacked: Why SMS OTP is a Dangerous Consumer Verification Method

You may have missed the story as you were leaving early last Friday for the long holiday weekend: Jack got hacked.

Jack, of course, is Jack Dorsey, CEO and co-founder of Twitter and Square. And ‘hacked’, in this instance, means that there were a number of inappropriate tweets that seemingly originated from his personal Twitter account. Twitter “regained control” of the account after about 15 minutes, but the damage was already done.

It’s worth examining exactly how the hackers gained access to Jack’s personal Twitter account. One might suspect that the highly visible CEO of a technology company would have best available security safeguards in place, and that any “hack” aimed at such an individual would require a tremendous amount of technical skill, coordination and resources.

Those suspicions would be wrong. The technique the hackers used was surprisingly simple and shockingly prevalent, especially in markets that have a majority of users with pre-paid mobile phone services: a SIM swap.

A SIM swap occurs when a fraudster, using a victim’s personal information gleaned off the dark web or other available sources, calls the victim’s mobile network operator (AT&T or T-Mobile, for example), and impersonating the victim, has the mobile network operator transfer the victim’s phone number to a different mobile device that is in the fraudster’s possession. Read full post

The post Jack got Hacked: Why SMS OTP is a Dangerous Consumer Verification Method appeared first on Boku Inc..

Read more on BOKU
Posted on September 11, 2019
Why Layering Is Going Out Of Fashion In Consumer Authentication

For those worried about the security of identity in the age of mobile, the last few weeks have not exactly been an encouraging time to be reading the headlines. Google’s Project Zero, an in-house team tasked with finding and publishing security and privacy vulnerabilities it finds in public software, released a blog post detailing major security holes it had discovered in iPhone software going back two years.

The flaws have been fixed since February, but industry watchers were bewildered that such exploits had sat out there for so long and that Apple had needed an outside team to discover it.

Also, bewildering was the fact that Google finding a hole in Apple’s security was the second most attention-grabbing security failure last week. The unfortunate distinction of first place went to Twitter CEO Jack Dorsey, who was a victim of a SIM Swap attack that left his Twitter account spewing racist invective for about 20 minutes.

It was a hard week to feel particularly secure on a mobile device, Karen Webster observed in a recent conversation with Boku CEO Jon Prideaux, as it was easy to get the feeling that an identity thief is hiding around every corner — and perhaps in every text message or Tweet to boot. Read full post

The post Why Layering Is Going Out Of Fashion In Consumer Authentication appeared first on Boku Inc..

Read more on BOKU
Posted on August 8, 2019
Why Mobile Phones Are The Better Consumer Authentication Mousetrap

At this point in 2019, we’ve all dealt with some flavor of two-factor authentication that uses SMS one-time passcodes. We attempt a sign-in and see a prompt that tells us that a six- (or nine, or four) digit PIN is being texted to us, and that we have to enter it to proceed with our login or password change. It’s a mild piece of friction, but it’s not terribly onerous and is doing something useful: keeping consumers safe.

Unless, of course, it isn’t. SMS one-time passcodes are more of a risk than most consumers realize, Boku CEO Jon Prideaux told Karen Webster in a recent conversation. The consumer thinks their bank is sending them a unique code that only they can directly access — but the reality is a little different.

A fraudster doesn’t always have to hack a phone to access a user’s identity and information — they can hack the person. Read full post

The post Why Mobile Phones Are The Better Consumer Authentication Mousetrap appeared first on Boku Inc..

Read more on BOKU
Posted on July 23, 2019
Navigating Identity’s ‘Big Canvas’ with Boku

The fundamental unit of trust in any transaction lies in identity — namely, ensuring that the person who shows up to transact is who they say they are. It’s also the most highly regulated part of any financial transaction.

“The identify verification that happens before accounts are opened are where governments and regulatory bodies very much tell you to do things in a certain way,” Boku CEO Jon Prideaux told Karen Webster in a recent conversation.

It’s a process that doesn’t leave much room for interpretation — either you are compliant or you’re not — and one in which companies tend to bring in a partner who can make the process of achieving and maintaining compliance less painful.

Yet it’s also a process that’s built around checking an individual’s credentials against various static data sources to confirm that person is who they claim to be and are not on any kind of watch list.

And it’s a process that, in a dynamic digital world, does not lend itself well to static data sources.

Prideaux told Webster that identity is a “big canvas,” and establishing the identity of parties is much more than a “one-and-done” check against a list. Making sure the person is authorized to use those credentials is critical to establishing trust — and it’s the sweet spot in which Boku operates. Read full post

The post Navigating Identity’s ‘Big Canvas’ with Boku appeared first on Boku Inc..

Read more on BOKU

See all news of BOKU

BOKU Comments:

Add your comment
Pages: 1 from 1