Welcome!

News Feed Item

Consumers Get to Know NXT-ID's Smart Wallet, Wocket™, in Series of CNBC Ads Starting the Week of May 12th

Wocket™ offers Solution for Identity Theft and Replaces all the Credit Cards and Loyalty Cards in Your Wallet

SHELTON, Connecticut, April 23, 2014 /PRNewswire/ --

NXT-ID, Inc., (OTCQB: NXTD) a biometric authentication company focused on the growing m-commerce market announces the roll out of the first 30 second ads to be aired on CNBC starting the week of May 12th. The consumer ads will feature the company's next generation smart wallet, Wocket™, created to securely replace all the credit cards and loyalty cards in your wallet.

The CNBC ads are part of a consumer marketing campaign to create brand awareness for Wocket™. Included is a press conference and marketing event to be held at the Plaza Hotel in New York City on May 28th, where the new image, logo, packaging, video and product demonstration will be revealed.

Mr. Gino Pereira, CEO of NXT-ID, Inc. said, "With current events highlighting the devastating extent of identity theft and compromised credit cards and passwords, Wocket™ is a product for today's unsecure world. The CNBC audience are ideal candidates for Wocket as is every household in the United States."

Wocket™ is a smart wallet in the same vein as the smart phone and smart watch. NXT-ID is introducing its innovative, patent-pending Wocket™ as the next natural step in the evolution of smart devices. Wocket™ is a next generation smart wallet designed to protect your identity and replace all the cards in your wallet, with no smart phone required. The Wocket works anywhere credit cards are accepted and only works with your biometric stamp of approval.

Credit, debit, ATM, loyalty, gift, ID, membership, insurance, ticket, emergency, medical, business, contacts, coupon, and virtually any card can be protected on Wocket™. More than 10,000 cards, records, coupons, etc. and 100 voice commands can also be stored on Wocket™.

Media and shareholders wishing to attend the May 28th event can email [email protected]

Wocket Consumer FAQ:  

"What is Wocket ™?

Wocket™ is a smart wallet. Like the smart phone and smart watch, NXT-ID is introducing its innovative, patent-pending Wocket™ as the next natural step in the evolution of smart devices. 

"What does Wocket™ do? 

Wocket™ locks all of your private information in an electronic "vault", where only an authenticated owner can authorize access to the data. Thus, you can "lock it with Wocket™ in your pocket", protecting your private information from unauthorized access. 

"What makes Wocket™ smart? 

Wocket™ smart wallet protects all of your private information inside an electronic vault while reducing the number of cards in your wallet. Dynamic pairing for authentication and encrypted data transfer with other secondary devices along with a plethora of new, innovative features makes Wocket™ the smartest wallet ever devised. 

"How is Wocket™ different from other smart card solutions? 

Wocket™ is not a smart card - it is a smart wallet. Thus, it can communicate with smart cards, but is not limited in the number, type, or method of communication of private information that typically restricts the use of a smart card. Furthermore, Wocket™ is not dependent on proximity or any other external factors to secure and choose soft-cards containing private information. 

"How is Wocket™ different from other digital wallet solutions? 

Rather than replace a wallet as many "digital wallet" technologies attempt to do, we chose to improve the wallet. Unlike other digital wallet solutions that depend on connectivity to choose a payment account, Wocket™ does not depend upon the cloud to select or make a payment. 

"Does Wocket™ require another device, such as a cell phone? 

No. Although Wocket™ does not require any other peripheral for security or "proximity sensing", Wocket™ can authenticate with secondary devices prior to transaction as an additional step in security as well as utilize a Wocket™ app on other devices to select or manage a soft-card, all without revealing private information. 

"How do I access my private information? 

A combination of biometrics, personal PIN or pattern provides multi-factor security for your Wocket™. Once Wocket™ verifies your identity, you can simply select whatever soft-card or information you want from the touch screen display, or in some configurations, your voce command.

"How many cards can be securely stored on a Wocket™? 

Up to 10,000 cards, records, coupons, etc. and up to 100 voice commands can also be stored on Wocket™. More can be supported with optional additional memory. 

The full Wocket  product FAQ is available to consumers and media at

http://nxt-id.com/wocket-faq/

Interested consumers can also sign up for product info and news alerts in anticipation of the product.  Advance ordering will be available following the May 28th event. http://www.wocketwallet.com/

About NXT-ID Inc. - Mobile Security for a Mobile World 

NXT-ID, Inc.'s (OTCQB: NXTD) innovative MobileBio™ solution mitigates consumer risks associated with mobile computing, m-commerce and smart OS-enabled devices. The company is focused on the growing m-commerce market, launching its innovative MobileBio™ suite of biometric solutions that secure consumers' mobile platforms led by the Wocket™ ; a next generation smart wallet designed to replace all the cards in your wallet, no smart phone required. The Wocket works anywhere credit cards are accepted and only works with your biometric stamp of approval. http://www.wocketwallet.com/

NXT-ID' wholly owned subsidiary, 3D-ID LLC, is engaged in biometric identification has 22 licensed patents in the field of 3D facial recognition http://www.nxt-id.com/, http://3d-id.net/

Forward-Looking Statements for NXT-ID

This press release contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. Forward-looking statements reflect management's current expectations, as of the date of this press release, and involve certain risks and uncertainties. Forward-looking statements include statements herein with respect to the successful execution of the Company's business strategy. The Company's actual results could differ materially from those anticipated in these forward- looking statements as a result of various factors. Such risks and uncertainties include, among other things, our ability to establish and maintain the proprietary nature of our technology through the patent process, as well as our ability to possibly license from others patents and patent applications necessary to develop products; the availability of financing; the Company's ability to implement its long range business plan for various applications of its technology; the Company's ability to enter into agreements with any necessary marketing and/or distribution partners; the impact of competition, the obtaining and maintenance of any necessary regulatory clearances applicable to applications of the Company's technology; and management of growth and other risks and uncertainties that may be detailed from time to time in the Company's reports filed with the Securities and Exchange Commission.

Contact:

Corporate info: [email protected]

Investor Inquiries:
Kirin Smith
ProActive Capital Group
Direct: +1-646-863-6519
[email protected]

Media: +1-800 665-0411

SOURCE NXT-ID, Inc

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
Whether they’re located in a public, private, or hybrid cloud environment, cloud technologies are constantly evolving. While the innovation is exciting, the end mission of delivering business value and rapidly producing incremental product features is paramount. In his session at @DevOpsSummit at 19th Cloud Expo, Kiran Chitturi, CTO Architect at Sungard AS, will discuss DevOps culture, its evolution of frameworks and technologies, and how it is achieving maturity. He will also cover various st...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
SYS-CON Events announced today that Niagara Networks will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Niagara Networks offers the highest port-density systems, and the most complete Next-Generation Network Visibility systems including Network Packet Brokers, Bypass Switches, and Network TAPs.
SYS-CON Events announced today that Secure Channels will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. The bedrock of Secure Channels Technology is a uniquely modified and enhanced process based on superencipherment. Superencipherment is the process of encrypting an already encrypted message one or more times, either using the same or a different algorithm.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
SYS-CON Events announced today that eCube Systems, a leading provider of middleware modernization, integration, and management solutions, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. eCube Systems offers a family of middleware evolution products and services that maximize return on technology investment by leveraging existing technical equity to meet evolving business needs. ...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addres...