System DesignAdvancedcase studyPart 10 of 29 in Backend Systems Mastery

System Design: Designing a Global Payment Gateway (Stripe Scale)

How does Stripe process billions in transactions safely? A technical deep dive into Payment Orchestration, Tokenization, Idempotency, and Double-Entry Ledgers.

Sachin SarawgiApril 20, 20265 min read5 minute lesson

System Design Masterclass: Designing a Payment Gateway (Stripe)

Designing a system to serve photos or short URLs is fundamentally about optimizing for read-latency and disk space. If a user's photo fails to load, they refresh the page.

Designing a Payment Gateway (like Stripe, Adyen, or PayPal) is a completely different engineering paradigm. It is fundamentally about Correctness, Atomicity, and Trust. If your system charges a user twice, or drops a transaction, the business faces massive legal and financial liability.

In this premium blueprint, we will design a highly secure, PCI-compliant payment orchestration platform.


1. Capacity Estimation & Constraints

Unlike social media platforms, payment gateways do not have millions of queries per second (QPS). Even global networks like Visa peak at roughly 65,000 QPS. Stripe operates well below that.

Assumptions:

  • Transactions: 10 Million transactions per day.
  • QPS: 10,000,000 / 86400 = ~115 QPS (average). Peak QPS around 1,000.
  • Latency: Because we must synchronously communicate with external banks, latency will be high (1s to 5s per request).
  • Availability: 99.999% (Five Nines). Downtime means merchants lose money instantly.
  • Consistency: Strong Consistency (ACID). Eventual consistency is entirely unacceptable for financial ledgers.

Conclusion: The engineering challenge is not network throughput; it is Resilience and Atomicity.


2. API Design

We need an endpoint for the merchant's backend to initiate a charge.

POST /v1/charges

Headers:

Authorization: Bearer sk_live_12345
Idempotency-Key: 7421-4f11-89ab-cd7123ef (Crucial!)

Request Body:

{
  "amount": 5000, 
  "currency": "usd",
  "source": "tok_12345", 
  "description": "Premium Subscription"
}

(Note: Always represent currency in its smallest unit, e.g., cents, to avoid floating-point math errors).


3. High-Level Architecture

The system acts as a router between the merchant and the highly-regulated global banking network.

graph TD
    Client[Client Browser/App] -->|1. Submit Card| Vault[PCI-Compliant Token Vault]
    Vault -->|2. Return Token| Client
    Client -->|3. Checkout| Merchant[Merchant Backend]
    
    Merchant -->|4. POST /charges| API[API Gateway]
    
    API -->|5. Verify| Idempotency[(Idempotency DB)]
    API -->|6. Check Risk| Risk[Fraud / ML Engine]
    API -->|7. Execute| Processor[Payment Processor Core]
    
    Processor -->|8. API Call| Bank[External Bank/Visa]
    Processor -->|9. Record| Ledger[(Double-Entry Ledger)]
    
    style Vault fill:#047857,stroke:#fff,stroke-width:2px,color:#fff
    style Processor fill:#1e40af,stroke:#fff,stroke-width:2px,color:#fff
    style Ledger fill:#b91c1c,stroke:#fff,stroke-width:2px,color:#fff

4. The Deep Dive: Core Engineering Pillars

Pillar A: Tokenization & PCI Compliance

Storing raw credit card numbers requires intense auditing (PCI-DSS compliance). If your database is breached, the company is ruined.

To minimize risk, we implement Tokenization:

  1. When a user types their credit card into a form, the form submits directly to our highly secure, isolated Vault service.
  2. The Vault encrypts the card and returns a one-time token (tok_12345).
  3. The merchant's backend only ever sees the token.
  4. When the merchant calls /v1/charges, our Payment Core asks the Vault to "detokenize" the card so we can send it to the bank.

Pillar B: Idempotency (The Most Critical Concept)

What happens if the merchant's server sends a charge request, our Payment Core charges the credit card, but right before we send the 200 OK response, the merchant's internet connection drops? The merchant's code will automatically retry the request. If we aren't careful, we will charge the user a second time.

The Idempotency Key

To prevent double-charging, the merchant must include a unique Idempotency-Key in the HTTP header (e.g., a UUID representing the shopping cart).

Before processing a charge, our API queries an Idempotency Database (often Redis or Postgres).
1. If the key exists and the status is PENDING, we return a 409 Conflict (a retry is already happening).
2. If the key exists and the status is SUCCESS, we return the cached JSON response from the previous successful call without talking to the bank again.
3. If it doesn't exist, we insert it as PENDING and proceed.

Pillar C: The Double-Entry Ledger

When money moves, it must be recorded perfectly. We do not use a standard users table with a balance column. We use a Double-Entry Ledger.

Every transaction creates two immutable, append-only records:

  1. CREDIT: Merchant Account (+ $50.00)
  2. DEBIT: Settlement Account (- $50.00)

Because the ledger is append-only, no row is ever UPDATED or DELETED. If a refund occurs, we append two new rows reversing the flow. This ensures a perfect audit trail that accountants and regulators can verify. The database backing this must be strongly consistent and support ACID transactions (e.g., PostgreSQL, CockroachDB, or Spanner).


5. Asynchronous Flows and Webhooks

Because bank APIs are notoriously slow and prone to timeouts, payment state machines are complex (PENDING -> AUTHORIZED -> CAPTURED -> SETTLED).

Merchants cannot leave HTTP connections open for hours waiting for a payment to settle. We use Webhooks to notify them asynchronously.

  1. When a payment state changes in the database, a CDC (Change Data Capture) tool like Debezium publishes an event to Kafka.
  2. A dedicated Webhook Dispatcher service consumes the event and sends an HTTP POST to the merchant's registered URL.
  3. If the merchant's server returns a 500 Error, the Dispatcher uses exponential backoff to retry delivery over the next 3 days.
Webhook Security

To prevent hackers from sending fake "Payment Successful" webhooks to the merchant, your gateway must sign the webhook payload using a cryptographic secret shared with the merchant. The merchant verifies the Stripe-Signature header before fulfilling the order.


Summary Checklist for the Interview

When an interviewer asks you to design a Payment Gateway, ensure you hit these four checkpoints:

  1. Emphasize that Correctness is vastly more important than QPS.
  2. Defend PostgreSQL (or another ACID database) for the Double-Entry Ledger. Never suggest Cassandra or MongoDB for core financial ledgers.
  3. Explicitly solve the double-charging problem using Idempotency Keys.
  4. Explain how Tokenization isolates PCI-compliance risk from the core application logic.
📚

Recommended Resources

Designing Data-Intensive ApplicationsBest Seller

The definitive guide to building scalable, reliable distributed systems by Martin Kleppmann.

View on Amazon
Kafka: The Definitive GuideEditor's Pick

Real-time data and stream processing by Confluent engineers.

View on Amazon
Apache Kafka Series on Udemy

Hands-on Kafka course covering producers, consumers, Kafka Streams, and Connect.

View Course

Practical engineering notes

Get the next backend guide in your inbox

One useful note when a new deep dive is published: system design tradeoffs, Java production lessons, Kafka debugging, database patterns, and AI infrastructure.

No spam. Just practical notes you can use at work.

Sachin Sarawgi

Written by

Sachin Sarawgi

Engineering Manager and backend engineer with 10+ years building distributed systems across fintech, enterprise SaaS, and startups. CodeSprintPro is where I write practical guides on system design, Java, Kafka, databases, AI infrastructure, and production reliability.

Continue Series

Backend Systems Mastery

Lesson 10 of 29 in this learning sequence.

Next in series
1

Beginner

What is Load Balancing? A Simple Guide for Backend Engineers

What is Load Balancing? Load balancing is a core component of any distributed system. It acts as a traffic cop sitting in front of your servers and routing client requests across all servers capable of fulfilling those r…

2

Beginner

System Design: Designing a Distributed ID Generator (Snowflake)

Designing a Distributed ID Generator > Prerequisite: To understand why distributed IDs are hard, first read about Database Sharding and Partitioning. In a distributed system, you often need to generate unique identifiers…

3

Beginner

gRPC vs REST: A Decision-Maker's Guide for Backend Architecture

gRPC vs REST: Which One for Your Microservices? > Prerequisite: Before diving into protocols, ensure you understand the fundamentals of Load Balancing and API Idempotency. Choosing between REST and gRPC is one of the mos…

4

Advanced

SQL vs NoSQL: Which One for Your Next Production MVP?

SQL vs NoSQL: Making the Right Choice One of the most debated topics in software engineering is whether to use a Relational (SQL) or Non-Relational (NoSQL) database. As a senior engineer, your choice shouldn't be based o…

5

Intermediate

System Design: Designing a URL Shortener (TinyURL)

System Design Masterclass: Designing a URL Shortener (TinyURL) Designing a URL shortener like TinyURL or Bitly is the most ubiquitous System Design interview question in the world. While it sounds trivial on the surface…

6

Advanced

Database Indexing Deep Dive: B-Trees, Hash Indexes, and Query Planning

Indexes are the single most impactful optimization in database performance. A 10-second query becomes 20ms with the right index. A wrong index slows writes and misleads the query planner. Understanding the internals — no…

7

Advanced

System Design: Designing a Global Distributed Rate Limiter

System Design Masterclass: Designing a Distributed Rate Limiter In a distributed environment, a single malicious script, a misconfigured client, or a massive traffic spike can easily overwhelm your backend servers, bring…

8

Advanced

Designing a Database Sharding Strategy for 100 Million Users

Vertical scaling has a ceiling. For most applications, that ceiling arrives somewhere between 1 million and 10 million users, depending on write patterns and data size. At 100 million users, the question is not whether t…

9

Beginner

gRPC vs REST: The Decision-Maker's Guide for Backend Architecture

gRPC vs REST: Which One for Your Microservices? In modern backend architecture, how services talk is as important as what they say. Choosing between REST and gRPC isn't just about syntax; it's about the trade-off between…

10

Advanced

System Design: Designing a Global Payment Gateway (Stripe Scale)

System Design Masterclass: Designing a Payment Gateway (Stripe) Designing a system to serve photos or short URLs is fundamentally about optimizing for read-latency and disk space. If a user's photo fails to load, they re…

11

Intermediate

Optimistic vs. Pessimistic Locking: Concurrency Control in Practice

Optimistic vs. Pessimistic Locking Imagine two users trying to book the last seat on a flight at the same time. If both read the count as "1" and decrement it, you've oversold the flight. This is the Lost Update Problem,…

12

Advanced

System Design: Designing a Distributed Task Scheduler

System Design Masterclass: Designing a Distributed Task Scheduler Every backend engineer has written a cron job. It's simple: you put a script on a Linux server and tell the OS to run it every night at midnight. But what…

13

Intermediate

Docker for Java Developers: A Production Guide to Containerization

Docker for Java Developers: Production Guide A common mistake in Java containerization is copying a fat JAR into a single-layer image. This results in 200MB+ images and slow deployment cycles. Here is how to build produc…

14

Advanced

Beyond CAP: Why PACELC is the Real Rule for Distributed Databases

Beyond CAP: Understanding the PACELC Theorem The CAP theorem (Consistency, Availability, Partition-tolerance) is a useful abstraction, but it only describes what happens when the network is broken. In the real world, the…

15

Advanced

Distributed Caching at Scale: Mitigating the Thundering Herd

Distributed Caching at Scale In a distributed system, caching is often the difference between a sub-100ms response and a total system collapse. However, most developers treat Redis as a simple "key-value bucket." At scal…

16

Advanced

The Transactional Outbox Pattern: Reliability in Microservices

The Transactional Outbox Pattern In a microservice, you often need to save data to a database (e.g., Order) and send an event to Kafka (e.g., OrderCreated). If the DB write succeeds but the Kafka send fails, your system…

17

Intermediate

API Pagination at Scale: Why OFFSET 100,000 is a Database Killer

API Pagination at Scale: Moving Beyond OFFSET Designing a paginated API seems simple: just use LIMIT 20 OFFSET 100. This works perfectly for the first few pages. However, once your users reach page 5,000, your database p…

18

Advanced

Inside the Linux Page Cache: The Invisible Database Accelerator

Inside the Linux Page Cache When your database (PostgreSQL, MongoDB, etc.) reads a row from disk, it doesn't just read the bytes and forget them. The Linux kernel intercepts the request and caches the data in a region of…

19

Intermediate

System Design: Designing Stateless Authentication

System Design: Designing Stateless Authentication In a microservices architecture, you can't rely on server-side sessions (stored in memory/database) because every request might hit a different service instance. Stateles…

20

Advanced

The Shadow Database Pattern: Verifying Schema Changes with Production Traffic

The Shadow Database Pattern Changing the schema of a 10TB database that is processing 50,000 requests per second is a high-stakes operation. Even with perfect testing in a staging environment, production traffic often re…

21

Intermediate

Kubernetes Networking: What Happens Between the Load Balancer and Your Pod?

Kubernetes Networking for Backend Developers As a backend engineer, you usually stop thinking about a request once it hits the Load Balancer. In Kubernetes, that is just the beginning. Understanding the network hop betwe…

22

Expert

S3 Express One Zone: When to Use it for Stateful Workloads

S3 Express One Zone Amazon S3 Express One Zone stores data in a single AZ, reducing network hops and latency. It's not a general-purpose storage; it's a specialized tool. 1. Use Case: Transient Data Perfect for Spark Shu…

23

Advanced

Service Mesh Internals: How Envoy and Istio Manage the Mesh

Service Mesh Internals A Service Mesh is a dedicated infrastructure layer for handling service-to-service communication. It's responsible for the reliable delivery of requests through a complex topology of services. 1. T…

24

Advanced

S3 Express One Zone: When to use it

S3 Express One Zone For stateful data processing (like Spark shuffle files), standard S3 latency is too high. S3 Express One Zone offers sub-millisecond access for transient data.

25

Advanced

Testing Distributed Systems: Chaos Mesh and Failure Injection

Testing Distributed Systems: Embracing Chaos In a distributed system, failure is the default state. To build resilient systems, you must move beyond unit tests and proactively inject failure into your production-like env…

26

Advanced

Terraform for Backend Engineers: Managing Your Own Infra

Terraform for Backend Engineers In modern engineering teams, the boundary between "Code" and "Infra" is blurring. As a backend developer, you should be able to spin up your own SQS queues or Postgres instances without op…

27

Advanced

The Expand-Contract Pattern: Zero-Downtime Database Schema Changes

The Expand-Contract Pattern: Zero-Downtime Migration The most dangerous operation in backend engineering is a breaking database schema change (e.g., renaming a column). If you just rename it, your existing application co…

28

Intermediate

System Design: Designing Idempotent APIs for Reliable Services

System Design: Designing Idempotent APIs In a distributed system, network failures are inevitable. A common failure scenario is: "The client sends a request -> The server processes it -> The server's response fails to re…

29

Advanced

LSM-Tree Compaction Strategies: Leveled vs. Size-Tiered

LSM-Tree Compaction Strategies LSM-tree based databases (Cassandra, RocksDB, ScyllaDB) don't update data in place. They write immutable SSTables. Over time, these files must be merged to reclaim space and improve reads.…

Keep Learning

Move through the archive without losing the thread.

Related Articles

More deep dives chosen from shared tags, category overlap, and reading difficulty.

System DesignAdvanced

System Design: Designing a Global Distributed Rate Limiter

System Design Masterclass: Designing a Distributed Rate Limiter In a distributed environment, a single malicious script, a misconfigured client, or a massive traffic spike can easily overwhelm your backend servers, bring…

Apr 20, 20266 min read
Case StudyBackend Systems Mastery
#system-design#rate-limiting#redis
System DesignAdvanced

System Design: Designing a Distributed Task Scheduler

System Design Masterclass: Designing a Distributed Task Scheduler Every backend engineer has written a cron job. It's simple: you put a script on a Linux server and tell the OS to run it every night at midnight. But what…

Apr 20, 20266 min read
Case StudyBackend Systems Mastery
#system-design#task-scheduler#cron
System DesignIntermediate

System Design: Designing Idempotent APIs for Reliable Services

System Design: Designing Idempotent APIs In a distributed system, network failures are inevitable. A common failure scenario is: "The client sends a request -> The server processes it -> The server's response fails to re…

Apr 20, 20262 min read
Deep DiveBackend Systems Mastery
#system-design#api-design#idempotency
System DesignBeginner

System Design: Designing a Distributed ID Generator (Snowflake)

Designing a Distributed ID Generator > Prerequisite: To understand why distributed IDs are hard, first read about Database Sharding and Partitioning. In a distributed system, you often need to generate unique identifiers…

Apr 20, 20262 min read
Deep DiveBackend Systems Mastery
#system-design#snowflake#distributed-id

More in System Design

Category-based suggestions if you want to stay in the same domain.