Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

2/24/2010
09:29 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Mocapay Unveils Secure Mobile Payments

Newly patented technology creates single solution to conduct secure mobile transactions in a multichannel environment

Denver - Feb. 23, 2010 -Mocapay, a mobile experience platform, today, introduced the only mobile solution in the marketplace that enables secure, hardware infrastructure agnostic, mobile payments regardless of tender type and transaction location.

Mocapay's "dynamic cryptogram" architecture, which recently received a U.S. patent, ensures every mobile payment transaction is executed simply and securely with a one-time use and perishable authorization code. Mocapay's transaction-level, token-based, mobile payments solution ensures that no customer sensitive information is stored on a mobile handset or passed to the merchant point-of-sale (POS).

The company was issued patent US 7,657,489 B2 on February 2, 2010 for this solution.

"Security and merchant acceptance is a critical component of mobile payments and one of the seminal reasons behind the limited adoption of mobile payments in the United States," said Kevin Grieve, CEO, Mocapay. "Our mobile payments platform ensures true anywhere, anytime mobile payments acceptance regardless of where the consumer wants to make a purchase or with which tender type the consumer chooses to use."

Mocapay offers its end-to-end mobile platform solution to merchant issuers of closed-loop loyalty, gift, and private-label credit, as well as financial institutions that issue open-loop prepaid, debit, and credit.

The company provides issuers three methods to utilize its patented mobile payments solution: out-of-the-box, Software-as-a-Service (SaaS) platform, or white-label, issuer-branded wallet and SaaS platform, or technology licensing giving issuers various solutions to match their business needs.

Mocapay's platform simplifies deployment and support by offering a single solution for multi-channel and multi-location mobile payment acceptance. The company offers issuers, depending upon tender type, three-modes of mobile connectivity: SMS/text, internet/browser enabled phones (WAP), and handset Apps (iPhone, Android, and soon to be released Blackberry). The solution can also be deployed by merchants for their own merchant-branded mobile loyalty and gift programs and used to accept funds from financial institution's that issue mobile open-loop tender.

Mocapay works with all the major US carriers further extending its consumer reach and has integrated its product with most of the major POS vendors.

As a mobile SaaS solution, Mocapay is downloaded onto the merchant's existing POS system preserving the merchant's current in-store, POS hardware and providing forward compatibility with future POS configurations. The Mocapay platform also has an embedded messaging engine enabling issuers to communicate to their consumers before, during, and after a payment transaction.

About Mocapay Mocapay is an end-to-end, mobile payments and experience platform for innovative issuers. The platform addresses merchants' need for a new channel that will broaden their loyalty and gift programs by mobilizing sales and marketing to reach customers anytime, not just at the point of sale, encourage purchases and build a stronger brand affinity. For innovative financial institution issuers, Mocapay reduces the implementation time, support complexity and costs associated with secure mobile payments increasing and accelerating consumer and merchant adoption. Based in Denver, Mocapay is a privately held, venture funded company founded in 2006. For more information, visit www.mocapay.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
Former CISA Director Chris Krebs Discusses Risk Management & Threat Intel
Kelly Sheridan, Staff Editor, Dark Reading,  2/23/2021
Edge-DRsplash-10-edge-articles
Security + Fraud Protection: Your One-Two Punch Against Cyberattacks
Joshua Goldfarb, Director of Product Management at F5,  2/23/2021
News
Cybercrime Groups More Prolific, Focus on Healthcare in 2020
Robert Lemos, Contributing Writer,  2/22/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Building the SOC of the Future
Building the SOC of the Future
Digital transformation, cloud-focused attacks, and a worldwide pandemic. The past year has changed the way business works and the way security teams operate. There is no going back.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-25284
PUBLISHED: 2021-02-27
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
CVE-2021-3144
PUBLISHED: 2021-02-27
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
CVE-2021-3148
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
CVE-2021-3151
PUBLISHED: 2021-02-27
i-doit before 1.16.0 is affected by Stored Cross-Site Scripting (XSS) issues that could allow remote authenticated attackers to inject arbitrary web script or HTML via C__MONITORING__CONFIG__TITLE, SM2__C__MONITORING__CONFIG__TITLE, C__MONITORING__CONFIG__PATH, SM2__C__MONITORING__CONFIG__PATH, C__M...
CVE-2021-3197
PUBLISHED: 2021-02-27
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.