News Feed Item

NXT-ID Announces Credit Card Fraud Prevention Initiative "Checkout With Wocket"

Preventing Fraud at the Point of Sale (POS)

SHELTON, CT -- (Marketwired) -- 01/07/14 -- NXT-ID, Inc. (OTCQB: NXTD), a biometrics company focused on the growing mobile commerce market, revealed its "Checkout with Wocket™" initiative today which utilizes patent-pending dynamic pairing technology (DPT) to prevent credit card fraud. The initiative secures all payment card information before, during and after transactions without changing the existing current payment infrastructure.

"2013 was clearly the 'Year of Personal Data Breach.' Target capped off the year with over 40 million credit and debit card account numbers lost to hackers by malware at point of sale terminals," says David Tunnell, CTO of NXT-ID. "Our dynamic pairing technology is built upon the existing systems retailers use today, but with the Wocket™ smart wallet, we can provide a dynamic pairing number for any account, not just a single 'card.'"

NXT-ID believes the problem behind credit card fraud is not the security of the server housing the card numbers but rather, whether or not that data is useful to a hacker. The "Checkout with Wocket™" initiative is built upon the simple principle of making that data useless in the case of a data breach. With this technology, if someone gained access to a credit card number used with a Wocket™ smart wallet, it would not work if sold or used outside of the Wocket™ itself, rendering it completely useless to a hacker.

Various methods such as one-time-passcodes (OTP) and chip-and-pin cards have attempted to improve security in the payment industry. Unfortunately, these approaches were not universal across all payment accounts and methods, and are often very expensive for retailers to support, requiring costly changes to infrastructure for wide-scale adoption. NXT-ID solves this problem by utilizing the Wocket™ smart wallet to generate a dynamic account number that reveals no information about the actual account number, but is "dynamically paired" to a specific account number so that a transaction can take place without uprooting the retailer's existing infrastructure. Since the Wocket™ uses standard magnetic stripe technology on its reprogrammable card, no additional hardware at the retailer level is required.

Unlike previous methods that generate an OTP or PIN for a single card, NXT-ID's smart wallet is unique in that it can generate one or a number of pseudo-random dynamic pairing codes that are correlated and charged to a single valid credit card account. With the Wocket™, card issuers now have a solution to prevent fraud from skimming and data breaches saving millions of dollars each year in fraudulent activity.

Any card number that is intercepted after the charge is useless for performing theft or fraud.

"We are very excited to offer a solution to the payment industry that prevents the rampant loss of private information that is so prevalent in recent news," says Gino Pereira, CEO of NXT-ID. "Dynamic pairing technology gives retailers, banks and credit card companies the opportunity to offer their customers the ability to confidently release their personal information without fear of fraud and without having to modify the current payment process. This is a true innovation for the future of payments."

Dynamic pairing technology compliments NXT-ID's widely anticipated next generation payment and identity protection product -- the Wocket

About The Wocket™

The Wocket™ is a next generation designed to replace all the cards in your wallet without draining your cell phone's battery; no smart phone required. The Wocket works anywhere credit cards are accepted and only works with your biometric stamp of approval. http://thewocket.com/

About NXT- ID Inc. - Mobile Security for a Mobile World: NXT-ID Inc.'s (OTCQB: NXTD) innovative MobileBio™ solution mitigates consumer risks associated with mobile computing, m-commerce and smart OS-enabled devices. The company is focused on the growing m-commerce market, launching its innovative MobileBio™ suite of biometric solutions that secure consumers' mobile platforms. NXT-ID's wholly owned subsidiary, 3D-ID LLC, is engaged in biometric identification and has 22 licensed patents in the field of 3D facial recognition http://www.nxt-id.com/, http://3d-id.net/

Forward-Looking Statements for NXT-ID: This press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements reflect management's current expectations, as of the date of this press release, and involve certain risks and uncertainties. Forward-looking statements include statements herein with respect to the successful execution of the Company's business strategy. The Company's actual results could differ materially from those anticipated in these forward-looking statements as a result of various factors. Such risks and uncertainties include, among other things, our ability to establish and maintain the proprietary nature of our technology through the patent process, as well as our ability to possibly license from others patents and patent applications necessary to develop products; the availability of financing; the Company's ability to implement its long range business plan for various applications of its technology; the Company's ability to enter into agreements with any necessary marketing and/or distribution partners; the impact of competition, the obtaining and maintenance of any necessary regulatory clearances applicable to applications of the Company's technology; and management of growth and other risks and uncertainties that may be detailed from time to time in the Company's reports filed with the Securities and Exchange Commission.

Corporate info:
Email Contact

Investor Inquiries:
Kirin Smith
ProActive Capital Group
Direct: 646 863 6519
Email Contact

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
Virgil consists of an open-source encryption library, which implements Cryptographic Message Syntax (CMS) and Elliptic Curve Integrated Encryption Scheme (ECIES) (including RSA schema), a Key Management API, and a cloud-based Key Management Service (Virgil Keys). The Virgil Keys Service consists of a public key service and a private key escrow service. 

In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, will discuss how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team a...
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
SYS-CON Events announced today that eCube Systems, the leading provider of modern development tools and best practices for Continuous Integration on OpenVMS, will exhibit at SYS-CON's @DevOpsSummit at Cloud Expo New York, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. eCube Systems offers a family of middleware products and development tools that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
Intelligent machines are here. Robots, self-driving cars, drones, bots and many IoT devices are becoming smarter with Machine Learning. In her session at @ThingsExpo, Sudha Jamthe, CEO of IoTDisruptions.com, will discuss the next wave of business disruption at the junction of IoT and AI, impacting many industries and set to change our lives, work and world as we know it.
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smar...
operations aren’t merging to become one discipline. Nor is operations simply going away. Rather, DevOps is leading software development and operations – together with other practices such as security – to collaborate and coexist with less overhead and conflict than in the past. In his session at @DevOpsSummit at 19th Cloud Expo, Gordon Haff, Red Hat Technology Evangelist, will discuss what modern operational practices look like in a world in which applications are more loosely coupled, are deve...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of So...
Enterprises have been using both Big Data and virtualization for years. Until recently, however, most enterprises have not combined the two. Big Data's demands for higher levels of performance, the ability to control quality-of-service (QoS), and the ability to adhere to SLAs have kept it on bare metal, apart from the modern data center cloud. With recent technology innovations, we've seen the advantages of bare metal erode to such a degree that the enhanced flexibility and reduced costs that cl...
With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, discussed the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filterin...
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
In past @ThingsExpo presentations, Joseph di Paolantonio has explored how various Internet of Things (IoT) and data management and analytics (DMA) solution spaces will come together as sensor analytics ecosystems. This year, in his session at @ThingsExpo, Joseph di Paolantonio from DataArchon, will be adding the numerous Transportation areas, from autonomous vehicles to “Uber for containers.” While IoT data in any one area of Transportation will have a huge impact in that area, combining sensor...