Welcome!

News Feed Item

NXT-ID Announces Credit Card Fraud Prevention Initiative "Checkout With Wocket"

Preventing Fraud at the Point of Sale (POS)

SHELTON, CT -- (Marketwired) -- 01/07/14 -- NXT-ID, Inc. (OTCQB: NXTD), a biometrics company focused on the growing mobile commerce market, revealed its "Checkout with Wocket™" initiative today which utilizes patent-pending dynamic pairing technology (DPT) to prevent credit card fraud. The initiative secures all payment card information before, during and after transactions without changing the existing current payment infrastructure.

"2013 was clearly the 'Year of Personal Data Breach.' Target capped off the year with over 40 million credit and debit card account numbers lost to hackers by malware at point of sale terminals," says David Tunnell, CTO of NXT-ID. "Our dynamic pairing technology is built upon the existing systems retailers use today, but with the Wocket™ smart wallet, we can provide a dynamic pairing number for any account, not just a single 'card.'"

NXT-ID believes the problem behind credit card fraud is not the security of the server housing the card numbers but rather, whether or not that data is useful to a hacker. The "Checkout with Wocket™" initiative is built upon the simple principle of making that data useless in the case of a data breach. With this technology, if someone gained access to a credit card number used with a Wocket™ smart wallet, it would not work if sold or used outside of the Wocket™ itself, rendering it completely useless to a hacker.

Various methods such as one-time-passcodes (OTP) and chip-and-pin cards have attempted to improve security in the payment industry. Unfortunately, these approaches were not universal across all payment accounts and methods, and are often very expensive for retailers to support, requiring costly changes to infrastructure for wide-scale adoption. NXT-ID solves this problem by utilizing the Wocket™ smart wallet to generate a dynamic account number that reveals no information about the actual account number, but is "dynamically paired" to a specific account number so that a transaction can take place without uprooting the retailer's existing infrastructure. Since the Wocket™ uses standard magnetic stripe technology on its reprogrammable card, no additional hardware at the retailer level is required.

Unlike previous methods that generate an OTP or PIN for a single card, NXT-ID's smart wallet is unique in that it can generate one or a number of pseudo-random dynamic pairing codes that are correlated and charged to a single valid credit card account. With the Wocket™, card issuers now have a solution to prevent fraud from skimming and data breaches saving millions of dollars each year in fraudulent activity.

Any card number that is intercepted after the charge is useless for performing theft or fraud.

"We are very excited to offer a solution to the payment industry that prevents the rampant loss of private information that is so prevalent in recent news," says Gino Pereira, CEO of NXT-ID. "Dynamic pairing technology gives retailers, banks and credit card companies the opportunity to offer their customers the ability to confidently release their personal information without fear of fraud and without having to modify the current payment process. This is a true innovation for the future of payments."

Dynamic pairing technology compliments NXT-ID's widely anticipated next generation payment and identity protection product -- the Wocket

About The Wocket™

The Wocket™ is a next generation designed to replace all the cards in your wallet without draining your cell phone's battery; no smart phone required. The Wocket works anywhere credit cards are accepted and only works with your biometric stamp of approval. http://thewocket.com/

About NXT- ID Inc. - Mobile Security for a Mobile World: NXT-ID Inc.'s (OTCQB: NXTD) innovative MobileBio™ solution mitigates consumer risks associated with mobile computing, m-commerce and smart OS-enabled devices. The company is focused on the growing m-commerce market, launching its innovative MobileBio™ suite of biometric solutions that secure consumers' mobile platforms. NXT-ID's wholly owned subsidiary, 3D-ID LLC, is engaged in biometric identification and has 22 licensed patents in the field of 3D facial recognition http://www.nxt-id.com/, http://3d-id.net/

Forward-Looking Statements for NXT-ID: This press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements reflect management's current expectations, as of the date of this press release, and involve certain risks and uncertainties. Forward-looking statements include statements herein with respect to the successful execution of the Company's business strategy. The Company's actual results could differ materially from those anticipated in these forward-looking statements as a result of various factors. Such risks and uncertainties include, among other things, our ability to establish and maintain the proprietary nature of our technology through the patent process, as well as our ability to possibly license from others patents and patent applications necessary to develop products; the availability of financing; the Company's ability to implement its long range business plan for various applications of its technology; the Company's ability to enter into agreements with any necessary marketing and/or distribution partners; the impact of competition, the obtaining and maintenance of any necessary regulatory clearances applicable to applications of the Company's technology; and management of growth and other risks and uncertainties that may be detailed from time to time in the Company's reports filed with the Securities and Exchange Commission.

Corporate info:
Email Contact

Investor Inquiries:
Kirin Smith
ProActive Capital Group
Direct: 646 863 6519
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
910Telecom exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and exchanges.
Whether you like it or not, DevOps is on track for a remarkable alliance with security. The SEC didn’t approve the merger. And your boss hasn’t heard anything about it. Yet, this unruly triumvirate will soon dominate and deliver DevSecOps faster, cheaper, better, and on an unprecedented scale. In his session at DevOps Summit, Frank Bunger, VP of Customer Success at ScriptRock, discussed how this cathartic moment will propel the DevOps movement from such stuff as dreams are made on to a practic...
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Niagara Networks exhibited at the 19th International Cloud Expo, which took place at the Santa Clara Convention Center in Santa Clara, CA, in November 2016. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
Zerto exhibited at SYS-CON's 18th International Cloud Expo®, which took place at the Javits Center in New York City, NY, in June 2016. Zerto is committed to keeping enterprise and cloud IT running 24/7 by providing innovative, simple, reliable and scalable business continuity software solutions. Through the Zerto Cloud Continuity Platform™, organizations can seamlessly move and protect virtualized workloads between public, private and hybrid clouds. The company’s flagship product, Zerto Virtual...
WebRTC is about the data channel as much as about video and audio conferencing. However, basically all commercial WebRTC applications have been built with a focus on audio and video. The handling of “data” has been limited to text chat and file download – all other data sharing seems to end with screensharing. What is holding back a more intensive use of peer-to-peer data? In her session at @ThingsExpo, Dr Silvia Pfeiffer, WebRTC Applications Team Lead at National ICT Australia, looked at differ...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
"Plutora provides release and testing environment capabilities to the enterprise," explained Dalibor Siroky, Director and Co-founder of Plutora, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Security, data privacy, reliability and regulatory compliance are critical factors when evaluating whether to move business applications from in-house client hosted environments to a cloud platform. In her session at 18th Cloud Expo, Vandana Viswanathan, Associate Director at Cognizant, In this session, will provide an orientation to the five stages required to implement a cloud hosted solution validation strategy.
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and 21st International Cloud Expo, which will take place in November in Silicon Valley, California.
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...