- Weak Online Banking Log-in
- "Card Not Present" Fraud
- Insecure Online Payment Card Transactions
-
Why is that important "Today?" Because... (see chart below)
- HACKER's TARGET: BANKS
- LEADING TYPE of FRAUD: "CARD NOT PRESENT" FRAUD
- ALL TYPEs OF CARDS TARGETED: CREDIT, DEBIT AND PREPAID
NECESSARY RESOURCE:
A product that can secure online banking log-in...
A product that can secure online banking log-in...
replicating the same trusted method used to disperse cash in real-time
NECESSARY RESOURCE:
A Product that can Eliminate the Ever Dangerous "Card Not Present" Environment, thus the leading cause of all payments fraud, "Card Not Present" Fraud
By swiping your card, it captures the data contained on the magnetic stripe, which is then instantaneously 3DES DUKPT encrypted. Both the Track 1 AND Track 2 data... "inside the device." Furthermore, our device captures the PVV (PIN Verification Value) and PVKI (PIN Verification Key Index) and 3DES/DUKPT encrypts the PIN data for secure, "outside the browser" transactions.
By swiping your card, it captures the data contained on the magnetic stripe, which is then instantaneously 3DES DUKPT encrypted. Both the Track 1 AND Track 2 data... "inside the device." Furthermore, our device captures the PVV (PIN Verification Value) and PVKI (PIN Verification Key Index) and 3DES/DUKPT encrypts the PIN data for secure, "outside the browser" transactions.
A product which works with every bank card, using existing bank rails.
No Question:
The fact that Visa, MasterCard, Discover, AMEX and JCB (those entities which comprise PCI) inspected, analyzed, tested and then provided HomeATM's device with "PCI 2.x PIN Entry Device Certification," demonstrates unequivocally, it's ability to capture the magnetic stripe data, securely encrypt it and transmit the encrypted cardholder data packet securely to it's destination.
100% Mimics Retail POS Terminal. The only differentiation being that HomeATM's
PIN Entry Device takes encryption a step further and also 3DES/DUKPT encrypts the Track 2 data