New Technology Makes Credit Cards Safe From Online Fraud

ICAP Patent Brokerage, a division of ICAP plc, a property brokerage and patent auction firm, and 3M Future LLC have just signed an exclusive marketing cooperation over a patent providing credit card security. The invention enables a mobile smart phone to act as a secure and advanced credit card. In addition the technology allows for toll-taking on card payments from these phones. This patent portfolio will allow the owner to move into and sustainably play in the field of payments.

Key Characteristics & Benefits

These fraud proof credit cards should be implemented as a standard applet on smart phones. The frequent usage of the payment facility justifies this.

The owner of a credit card can perform secure credit card transactions. These payments are fraud proof, even if the credit card number and other details are compromised and accessible to fraudsters, because only the owner of the credit card can switch the card ON and OFF from his mobile smart phone.

Any unauthorized use of such protected card is impossible, even with payments to remote merchants via the Internet or via telephone. This is a compelling proposition for the many affluent smart phone owners throughout the world, who were waiting for a secure and easy means to pay for goods and services on the Internet.

An invaluable feature of this invention, unlike the plethora of competitors, is that a credit card secured with this patent will work instantly with any merchant. So the cards can be rolled out rapidly in specific countries or worldwide together with smart phones or smart phone operating systems.

The PSOCA security mechanism as disclosed by the assets is easy to understand for the consumer and can easily be marketed to consumers. Simply put, the card will automatically switch off once a transaction is complete.

Market Potential

This patent portfolio should be of interest to institutions that provide smart phone operating systems, manufacturers of smart phones and banks.

    * Global e-commerce revenues are estimated to grow 19% in 2011 reaching $680 billion by the end of the year with 60% of global                  consumers using their credit cards for online purchases.(1,2)
    * In the US alone, e-commerce transactions totaled $165 billion in 2010.(3)

"Mobile payment systems will be at the forefront of e-commerce in the future, and securing these systems from unauthorized access or hacking will be critical for their use and adoption by end consumers," says Dean Becker, CEO, ICAP Patent Brokerage.  "This technology should be of interest to financial institutions, smart phone manufacturers, smart phone developers, e-commerce companies, or any other organizations looking to enter this fast growing space."

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3