Credit Card Cyber Defense System!

Similar documents
Internet Usage (as of November 1, 2011)

Serialization, Traceability and e-pedigree

Whitepaper on AuthShield Two Factor Authentication with ERP Applications

Payment Methods. The cost of doing business. Michelle Powell - BASYS Processing, Inc.

How Multi-Pay Tokens Can Reduce Security Risks and the PCI Compliance Burden for ecommerce Merchants

Credit card: permits consumers to purchase items while deferring payment

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

Intel Identity Protection Technology Enabling improved user-friendly strong authentication in VASCO's latest generation solutions

Raising Awareness of Issues by Adapting the NIST IT Security Services Model to E-Business Systems. Robert L. Probert, Victor Sawma¹

White Paper: Are there Payment Threats Lurking in Your Hospital?

EMV and Chip Cards Key Information On What This Is, How It Works and What It Means

White Paper. Enhancing Website Security with Algorithm Agility

Dashlane Security Whitepaper

Web Payment Security. A discussion of methods providing secure communication on the Internet. Zhao Huang Shahid Kahn

Computer Networks. Network Security and Ethics. Week 14. College of Information Science and Engineering Ritsumeikan University

Chapter 11 E-Commerce

Intel Identity Protection Technology (IPT)

Step 1. Step 2. Open your browser and go to and you will be presented a logon screen show below.

White Paper: Webservio Ecommerce Solution

Electronic Commerce and E-wallet

Junos Pulse for Google Android

Cyber Security Awareness. Internet Safety Intro.

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

QR-CODE BASED NON-REPUDIATION TRANSACTION VERIFICATION SYSTEM

A Brand New Checkout Experience

A Brand New Checkout Experience

Password Manager with 3-Step Authentication System

Professional Ethics for Computer Science

EMV and Small Merchants:

How Secure are Contactless Payment Systems?

Apple Pay. Frequently Asked Questions UK Launch

Research Article. Research of network payment system based on multi-factor authentication

Using End User Device Encryption to Protect Sensitive Information

Protecting Your POS System from PoSeidon and Other Malware Attacks

Chapter 1: Introduction

CSC Network Security. User Authentication Basics. Authentication and Identity. What is identity? Authentication: verify a user s identity

EBA SECUREPAY COMPLIANCE GUIDE entrust.com

DATA SECURITY, FRAUD PREVENTION AND COMPLIANCE

EMV and Encryption + Tokenization: A Layered Approach to Security

Framework of e-commerce

Entrust IdentityGuard

Our Key Security Features Are:

Content Teaching Academy at James Madison University

BE SAFE ONLINE: Lesson Plan

S E P T E M B E R

6. ecommerce Security and Payment Systems. Alexander Nikov. Teaching Objectives. Video: Online Banking, Is It Secure?

Go Digital Kuranda Workshop Manual

Flexible and secure. acceo tender retail. payment solution. tender-retail.acceo.com

CONTENT SECURITY KRAMER S APPROACH TO SECURING DATA WITHIN WIRELESS TRANSMISSION KRAMER WHITE PAPER

SOLUTION OF IGNOU ASSIGNMENT BY BYAS KUMAR GUPTA. BCA 6 th SEM Assignment Solution COURSE CODE BCS 062

FORBIDDEN - Ethical Hacking Workshop Duration

Ingenious Systems. Evolute System's. Mobile Payment. Initiative

10 Quick Tips to Mobile Security

Loophole+ with Ethical Hacking and Penetration Testing

Payment Systems for E-Commerce. Shengyu Jin 4/27/2005

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Zapper for ecommerce. Magento Plugin Version Checkout

E-commerce. Security. Learning objectives. Internet Security Issues: Overview. Managing Risk-1. Managing Risk-2. Computer Security Classifications

Mobile Payment Solutions: Best Practices and Guidelines

Payment Cardholder Data Handling Procedures (required to accept any credit card payments)

mobile payment acceptance Solutions Visa security best practices version 3.0

ICOM 5018 Network Security and Cryptography

A Study of an On-Line Credit Card Payment Processing and Fraud Prevention for e-business

Frequently Asked Questions

Cloud Portal Guest Invitations 4.0

Chapter 11: E-Commerce

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

CA ArcotOTP Versatile Authentication Solution for Mobile Phones

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Authentication Levels. White Paper April 23, 2014

An Innovative Two Factor Authentication Method: The QRLogin System

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Improving Online Security with Strong, Personalized User Authentication

CyberSource and NetSuite Getting Started Guide

Voltage SecureData Web with Page-Integrated Encryption (PIE) Technology Security Review

IDRBT Working Paper No. 11 Authentication factors for Internet banking

Authorize.net modules for oscommerce Online Merchant.

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

ViSolve Open Source Solutions

1.Because e-commerce is ubiquitous it reduces A. marketspace. B. transaction costs. C. dynamic pricing. D. price discrimination.

global leader in seamless payment

Security Challenges. in Moving to Externalized Datacenters. (Focusing on SaaS) Eran Birk, Spring Business. Intelligence

Apple Pay. Frequently Asked Questions UK

CHAPTER 26 - SHOPPING CART

Why Data Security is Critical to Your Brand

Michael Seltzer COMP 116: Security Final Paper. Client Side Encryption in the Web Browser Mentor: Ming Chow

Chapter 10. e-payments

Innovation in payments an overview

Second Level Authentication Using QR Codes

PCI DSS FAQ. The twelve requirements of the PCI DSS are defined as follows:

RFID based Bill Generation and Payment through Mobile

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Newtek, The Small Business Authority 855-2thesba thesba.com 855-2thesba

Emerging Trends in the Payment Ecosystem: The Good, the Bad and the Ugly DAN KRAMER

ELECTRONIC COMMERCE OBJECTIVE QUESTIONS

Keystroke Encryption Technology Explained

Advanced Authentication

Avoiding Fraud. Learn to recognize the warning signs for fraud and follow these card acceptance guidelines to reduce your risk.

Transcription:

Credit Card Cyber Defense System

About Us QRedit was conceived in 2013 by a team of cryptography, cyber security and counterfeit protection specialists. Our mission is to provide an innovative solution for protecting the consumer s identity and credit card details when shopping online.

The Pitch QReditCard is designed to allow consumers to complete transactions securely online and through Facebook, even on an infected computer (virus, malware, keylogger), all while expediting the online check-out process.

B2B Target Segments Banks Payment Gateways Credit Card Issuers E- Commerce M- Commerce

The Problem Current Online Check-Out Time consuming process. Voluntarily provide data. Bank and e-commerce site subject to breach. Personal device may be infected with malware or virus.

Online Credit Card Theft Data breaches. According to the Privacy Rights Clearinghouse, over 600 million records have been stolen since 2005. If a company or website that has your credit card information has a data breach, then it is likely that your credit card number can fall into the wrong hands. Keystroke logging. Another common way that a thief can get your credit card number is by installing a so-called keylogger on your computer without your knowledge and record every keystroke you make, including credit card numbers and security codes. http://goo.gl/qnlsrv

The Solution QRedit 360 degree Secure Payment Solutions. B2C Provide consumers with a platform to secure their existing bank and/or credit card details, to protect their identity when shopping online. For FREE. B2B Provide Banks and Issuers with a white labeled security solution to offer their clients. Provide customary fee based QRedit s Secure Processing Service to merchants. Profit share with Payment Processors who license QRedit s Secure Processing Service. Consumers entire credit card details, billing address, cell phone number and email address are encrypted in the QR code

Expedite Online Check-Out Experience Eliminates the need to manually enter any information on an e- Commerce site. 3-Step check out process.

3-Step Process Select Payby-Barcode option on e-commerce site Align barcode side of the credit card to your webcam Confirm SMS authentication token received from bank Step 1 Step 2 Step 3 Once the transaction is confirmed by the credit card holder, the QRedit s processing server will send an authorization code and shipping details to the merchant. It s easy as 1-2-3.

Secure Payment Application with QRedit (Pay by Barcode) By-pass manual entry with Pay by Barcode option. Clicking on Pay by Barcode will initiate the camera on any device. Pay by Barcode Scan barcode on backside of Credit Card to complete the transaction

Secure Payment Application with QRedit (Confirm Security Code) After scanning the encrypted barcode, you will receive a one time use (OTP) code via SMS or Email to verify purchase. Demo Video: http://www.youtube.com/watch?v=kkzqkts4dpg

Secure Payment Application with QRedit (Confirm Transaction) Enter Confirmation Code, click Submit and receive status: Valid Code Confirm e-commerce site and amount. Click Pay button. Secure transaction is complete Demo Video: http://www.youtube.com/watch?v=kkzqkts4dpg

Benefits to All QRedit benefits consumers who refuse to shop online to due credit card fraud. It enables them to secure themselves when shopping online. QRedit benefits the merchant by expediting the online check out experience by up to 98%. Reduces chargebacks, and provides an additional layer of security to PCI-DSS. QRedit benefits banks and issuers by helping to reduce the possibility of a data breach, reduce fraud, and increase card usage. QRedit benefits insurance companies through a reduction in payouts. QRedit benefits governments by providing traceability for every transaction while monitoring, in real time, potential money laundering activities.

Benefits to Partner Attract customers from competing banks. Expand international reach. Provide innovate solutions in the secure payment space. Add to product/solution offerings. Opportunity to market future products (see pg 15).

Future Products QRedit Card is at the forefront of Cryptocodex s Secure Payment Solutions. This flagship system is the product of more than 10 years of R&D, culminating in the development of the most advanced encryption technology in the world. Future products may include, but are not limited to the following: - Brick and mortar payment solution. Any merchant that uses a smart phone or tablet and a dongle to accept payment is QRedit Card ready. - EMV Integration - NFC Integration - Mobile Wallet - Secure Banking Log-In

Encryption Encryption technology is the only symmetrical, polymorphic, non-mathematical encryption method in the world. Its key strength (minimum 1 million bit key size) is truly chaotic and based on a innovative, patent pending technology called PHR Pure Human Randomization. PHR replaces the structuring and use of a pseudo-random calculative hash function. PHR is protected against Rainbow Crack, Dictionary Attack, Cryptanalysis and Brute Force. Key Strength 1 million bit or more Performance 400% faster compared to AES. MPU use Mathematical Process Unit in CPU use 3% 7% only. Overhead of the file from original 5% +/- (original+5%) +/- Info: http://www.youtube.com/watch?v=iabwv-hrhhe

Micro Database Less Encapsulation (MDLE) Other encryption algorithms have a bit overhead of between 300-700% when encrypting small amounts of information. PHR on the other hand uses an unparalleled, non dictionary compression ratio operational technique which has a bit overhead of 5-7%. Because of this, we are capable of encrypting relevant information into one 2D barcode. A process referred to as MDLE Micro Database Less Encapsulation. Info: http://www.youtube.com/watch?v=iabwv-hrhhe

For Investor Relations, Please Contact Eddie Cohen eddie.cohen@6dcp.com