|By Marketwired .||
|January 7, 2014 01:52 PM EST||
SHELTON, CT -- (Marketwired) -- 01/07/14 -- NXT-ID, Inc. (OTCQB: NXTD), a biometrics company focused on the growing mobile commerce market, revealed its "Checkout with Wocket" initiative today which utilizes patent-pending dynamic pairing technology (DPT) to prevent credit card fraud. The initiative secures all payment card information before, during and after transactions without changing the existing current payment infrastructure.
"2013 was clearly the 'Year of Personal Data Breach.' Target capped off the year with over 40 million credit and debit card account numbers lost to hackers by malware at point of sale terminals," says David Tunnell, CTO of NXT-ID. "Our dynamic pairing technology is built upon the existing systems retailers use today, but with the Wocket smart wallet, we can provide a dynamic pairing number for any account, not just a single 'card.'"
NXT-ID believes the problem behind credit card fraud is not the security of the server housing the card numbers but rather, whether or not that data is useful to a hacker. The "Checkout with Wocket" initiative is built upon the simple principle of making that data useless in the case of a data breach. With this technology, if someone gained access to a credit card number used with a Wocket smart wallet, it would not work if sold or used outside of the Wocket itself, rendering it completely useless to a hacker.
Various methods such as one-time-passcodes (OTP) and chip-and-pin cards have attempted to improve security in the payment industry. Unfortunately, these approaches were not universal across all payment accounts and methods, and are often very expensive for retailers to support, requiring costly changes to infrastructure for wide-scale adoption. NXT-ID solves this problem by utilizing the Wocket smart wallet to generate a dynamic account number that reveals no information about the actual account number, but is "dynamically paired" to a specific account number so that a transaction can take place without uprooting the retailer's existing infrastructure. Since the Wocket uses standard magnetic stripe technology on its reprogrammable card, no additional hardware at the retailer level is required.
Unlike previous methods that generate an OTP or PIN for a single card, NXT-ID's smart wallet is unique in that it can generate one or a number of pseudo-random dynamic pairing codes that are correlated and charged to a single valid credit card account. With the Wocket, card issuers now have a solution to prevent fraud from skimming and data breaches saving millions of dollars each year in fraudulent activity.
Any card number that is intercepted after the charge is useless for performing theft or fraud.
"We are very excited to offer a solution to the payment industry that prevents the rampant loss of private information that is so prevalent in recent news," says Gino Pereira, CEO of NXT-ID. "Dynamic pairing technology gives retailers, banks and credit card companies the opportunity to offer their customers the ability to confidently release their personal information without fear of fraud and without having to modify the current payment process. This is a true innovation for the future of payments."
Dynamic pairing technology compliments NXT-ID's widely anticipated next generation payment and identity protection product -- the Wocket
About The Wocket
The Wocket is a next generation designed to replace all the cards in your wallet without draining your cell phone's battery; no smart phone required. The Wocket works anywhere credit cards are accepted and only works with your biometric stamp of approval. http://thewocket.com/
About NXT- ID Inc. - Mobile Security for a Mobile World: NXT-ID Inc.'s (OTCQB: NXTD) innovative MobileBio solution mitigates consumer risks associated with mobile computing, m-commerce and smart OS-enabled devices. The company is focused on the growing m-commerce market, launching its innovative MobileBio suite of biometric solutions that secure consumers' mobile platforms. NXT-ID's wholly owned subsidiary, 3D-ID LLC, is engaged in biometric identification and has 22 licensed patents in the field of 3D facial recognition http://www.nxt-id.com/, http://3d-id.net/
Forward-Looking Statements for NXT-ID: This press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements reflect management's current expectations, as of the date of this press release, and involve certain risks and uncertainties. Forward-looking statements include statements herein with respect to the successful execution of the Company's business strategy. The Company's actual results could differ materially from those anticipated in these forward-looking statements as a result of various factors. Such risks and uncertainties include, among other things, our ability to establish and maintain the proprietary nature of our technology through the patent process, as well as our ability to possibly license from others patents and patent applications necessary to develop products; the availability of financing; the Company's ability to implement its long range business plan for various applications of its technology; the Company's ability to enter into agreements with any necessary marketing and/or distribution partners; the impact of competition, the obtaining and maintenance of any necessary regulatory clearances applicable to applications of the Company's technology; and management of growth and other risks and uncertainties that may be detailed from time to time in the Company's reports filed with the Securities and Exchange Commission.
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Sep. 26, 2016 06:30 AM EDT Reads: 2,341
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Sep. 26, 2016 06:30 AM EDT Reads: 1,566
Most of us already know that adopting new cloud applications can boost a business’s productivity by enabling organizations to be more agile and ready to change course in our fast-moving and connected digital world. But the rapid adoption of cloud apps and services also brings with it profound security threats, including visibility and control challenges that aren’t present in traditional on-premises environments. At the same time, the cloud – because of its interconnected, flexible and adaptable...
Sep. 26, 2016 06:15 AM EDT Reads: 1,641
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Sep. 26, 2016 05:15 AM EDT Reads: 1,814
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Sep. 26, 2016 04:30 AM EDT Reads: 1,414
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
Sep. 26, 2016 04:30 AM EDT Reads: 1,045
Information technology is an industry that has always experienced change, and the dramatic change sweeping across the industry today could not be truthfully described as the first time we've seen such widespread change impacting customer investments. However, the rate of the change, and the potential outcomes from today's digital transformation has the distinct potential to separate the industry into two camps: Organizations that see the change coming, embrace it, and successful leverage it; and...
Sep. 26, 2016 03:15 AM EDT Reads: 1,085
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Sep. 26, 2016 03:00 AM EDT Reads: 949
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Sep. 26, 2016 03:00 AM EDT Reads: 1,766
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
Sep. 26, 2016 02:45 AM EDT Reads: 1,552
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Sep. 26, 2016 01:45 AM EDT Reads: 1,675
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
Sep. 26, 2016 01:00 AM EDT Reads: 1,960
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...
Sep. 26, 2016 01:00 AM EDT Reads: 1,626
I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi...
Sep. 26, 2016 12:30 AM EDT Reads: 1,251
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Sep. 26, 2016 12:30 AM EDT Reads: 1,546