|By Marketwired .||
|April 16, 2014 08:40 AM EDT||
SHELTON, CT -- (Marketwired) -- 04/16/14 -- NXT-ID, Inc. (OTCQB: NXTD), a biometric authentication company focused on the growing m-commerce market, announced today that it will be featuring its next generation smart wallet, Wocket, designed to replace all the cards in your wallet in a CNBC ad campaign starting in May. The add roll-out will commence prior to the previously announced May 28th press conference and marketing event to held at the Plaza Hotel in New York City.
The ad campaign will focus on Wocket's launch and its potential to revolutionize the payment industry.
Wocket is a smart wallet in the same vein as the smart phone and smart watch. NXT-ID is introducing its innovative, patent-pending Wocket as the next natural step in the evolution of smart devices. Wocket is a next generation smart wallet designed to replace all the cards in your wallet, with no smart phone required. The Wocket works anywhere credit cards are accepted and only works with your biometric stamp of approval.
Credit, debit, ATM, loyalty, gift, ID, membership, insurance, ticket, emergency, medical, business, contacts, coupon, and virtually any card can be protected on Wocket. More than 10,000 cards, records, coupons, etc. and 100 voice commands can also be stored on Wocket.
Mr. Gino Pereira, CEO of NXT-ID, Inc., said in regards to the upcoming ad campaign, "According to Travelers Insurance Company, 44% of all identity theft in the United States stems from a lost or stolen wallet. Approximately 12 million people a year fall victim to identity fraud. Wocket is the solution to this epidemic. Wocket replaces your existing wallet and stores all the cards that you own in a secure environment and utilizes one dynamic card to represent all your cards."
Starting dates and air times for the ad campaign on CNBC will be announced shortly. The May 28th event will introduce Wocket, its new brand identity and marketing roll out.
Media and shareholders wishing to attend the May 28th event can email [email protected]
Wocket Consumer FAQ:
"What is Wocket ?
Wocket is a smart wallet. Like the smart phone and smart watch, NXT-ID is introducing its innovative, patent-pending Wocket as the next natural step in the evolution of smart devices.
"What does Wocket do?
Wocket locks all of your private information in an electronic "vault", where only an authenticated owner can authorize access to the data. Thus, you can "lock it with Wocket in your pocket", protecting your private information from unauthorized access.
"What makes Wocket smart?
Wocket smart wallet protects all of your private information inside an electronic vault while reducing the number of cards in your wallet. Dynamic pairing for authentication and encrypted data transfer with other secondary devices along with a plethora of new, innovative features makes Wocket the smartest wallet ever devised.
"How is Wocket different from other smart card solutions?
Wocket is not a smart card - it is a smart wallet. Thus, it can communicate with smart cards, but is not limited in the number, type, or method of communication of private information that typically restricts the use of a smart card. Furthermore, Wocket is not dependent on proximity or any other external factors to secure and choose soft-cards containing private information.
"How is Wocket different from other digital wallet solutions?
Rather than replace a wallet as many "digital wallet" technologies attempt to do, we chose to improve the wallet. Unlike other digital wallet solutions that depend on connectivity to choose a payment account, Wocket does not depend upon the cloud to select or make a payment.
"Does Wocket require another device, such as a cell phone?
No. Although Wocket does not require any other peripheral for security or "proximity sensing", Wocket can authenticate with secondary devices prior to transaction as an additional step in security as well as utilize a Wocket app on other devices to select or manage a soft-card, all without revealing private information.
"How do I access my private information?
A combination of biometrics, personal PIN or pattern provides multi-factor security for your Wocket. Once Wocket verifies your identity, you can simply select whatever soft-card or information you want from the touch screen display, or in some configurations, your voice command.
"How many cards can be securely stored on a Wocket?
Up to 10,000 cards, records, coupons, etc. and up to 100 voice commands can also be stored on Wocket. More can be supported with optional additional memory.
The full Wocket product FAQ is available to consumers and media at
Interested consumers can also sign up for product info and news alerts in anticipation of the product. Pre-ordering will be available following the May 28th event. http://www.thewocket.com/, http://www.wocketwallet.com/
About NXT- ID Inc. - Mobile Security for a Mobile World
NXT-ID, Inc.'s (OTCQB: NXTD) innovative MobileBio solution mitigates consumer risks associated with mobile computing, m-commerce and smart OS-enabled devices. The company is focused on the growing m-commerce market, launching its innovative MobileBio suite of biometric solutions that secure consumers' mobile platforms led by the Wocket; a next generation smart wallet designed to replace all the cards in your wallet, no smart phone required. The Wocket works anywhere credit cards are accepted and only works with your biometric stamp of approval. http://www.thewocket.com/, http://www.wocketwallet.com/
Forward-Looking Statements for NXT-ID
This press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements reflect management's current expectations, as of the date of this press release, and involve certain risks and uncertainties. Forward-looking statements include statements herein with respect to the successful execution of the Company's business strategy. The Company's actual results could differ materially from those anticipated in these forward- looking statements as a result of various factors. Such risks and uncertainties include, among other things, our ability to establish and maintain the proprietary nature of our technology through the patent process, as well as our ability to possibly license from others patents and patent applications necessary to develop products; the availability of financing; the Company's ability to implement its long range business plan for various applications of its technology; the Company's ability to enter into agreements with any necessary marketing and/or distribution partners; the impact of competition, the obtaining and maintenance of any necessary regulatory clearances applicable to applications of the Company's technology; and management of growth and other risks and uncertainties that may be detailed from time to time in the Company's reports filed with the Securities and Exchange Commission.
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2569676
Image Available: http://www2.marketwire.com/mw/frame_mw?attachid=2569700
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 4, 2016 09:45 AM EDT Reads: 413
A critical component of any IoT project is the back-end systems that capture data from remote IoT devices and structure it in a way to answer useful questions. Traditional data warehouse and analytical systems are mature technologies that can be used to handle large data sets, but they are not well suited to many IoT-scale products and the need for real-time insights. At Fuze, we have developed a backend platform as part of our mobility-oriented cloud service that uses Big Data-based approache...
May. 4, 2016 09:45 AM EDT Reads: 412
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 4, 2016 09:30 AM EDT Reads: 432
Digital payments using wearable devices such as smart watches, fitness trackers, and payment wristbands are an increasing area of focus for industry participants, and consumer acceptance from early trials and deployments has encouraged some of the biggest names in technology and banking to continue their push to drive growth in this nascent market. Wearable payment systems may utilize near field communication (NFC), radio frequency identification (RFID), or quick response (QR) codes and barcodes...
May. 4, 2016 08:15 AM EDT Reads: 982
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 4, 2016 08:00 AM EDT Reads: 1,242
In his session at 18th Cloud Expo, Sagi Brody, Chief Technology Officer at Webair Internet Development Inc., will focus on real world deployments of DDoS mitigation strategies in every layer of the network. He will give an overview of methods to prevent these attacks and best practices on how to provide protection in complex cloud platforms. He will also outline what we have found in our experience managing and running thousands of Linux and Unix managed service platforms and what specifically c...
May. 4, 2016 08:00 AM EDT Reads: 1,271
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
May. 4, 2016 08:00 AM EDT Reads: 1,169
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
May. 4, 2016 08:00 AM EDT Reads: 1,303
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 4, 2016 07:45 AM EDT Reads: 1,181
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 4, 2016 07:00 AM EDT Reads: 830
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 4, 2016 07:00 AM EDT Reads: 1,042
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 4, 2016 06:00 AM EDT Reads: 1,247
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
May. 4, 2016 04:45 AM EDT Reads: 1,338
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
May. 4, 2016 12:45 AM EDT Reads: 1,187
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
May. 3, 2016 10:00 PM EDT Reads: 1,369