total jobs On InformationTechnologyCrossing

269,836

new jobs this week On InformationTechnologyCrossing

18,410

total jobs on EmploymentCrossing network available to our members

1,474,731

job type count

On InformationTechnologyCrossing

Behold the EncryptaKey-per!

1 Views      
What do you think about this article? Rate it using the stars above and let us know what you think in the comments below.
Recently introduced at the 2007 Consumer Electronics Conference, EncryptaKey has proven it has the requisite qualities of a secure information-storage device. With identity theft and related fraud achieving annual losses of $56 billion, customers and businesses alike have been yearning for an ideal means of protecting their credit from the commonplace mischief caused by the wiles of identity hackers and the inattentiveness that leads to human error.

Created to provide security during online and in-store purchasing, EncryptaKey is an easily manageable handheld device designed to contain all personal information, wirelessly storing credit card and other financial data with absolute security during data exchange. It is a portable USB thumb drive comprised of an LCD screen, RFID chip, and biometric scanner utilizing Bluetooth technology.

Acting as the wallet for the Information Age, the EncryptaKey is compact enough to attach to a key ring. It can connect to any USB port for untraceable online transactions and implements its RFID technology to secure in-person transactions. It also stores personal identification data for identity verification so that only the authorized user may use the device. The user can access the information contained—without transmitting private data to the merchant or across the Internet—by placing his or her fingerprint on the device. This new technology is compatible with a broad range of wireless point-of-sale terminals and ATMs. It carries all the user's credit and related cards for transactions and is charged from the USB port while connected to a computer.



Three security measures will activate the EncryptaKey. First, the biometric scanner identifies the fingerprint of the user. (For additional security, it can be programmed to recognize any of the user's fingers.) Second, the device asks the user to select a shape from a list of 25 images. Third, the portal provides a prompt to enter a username and password. Once these three steps are completed, the EncryptaKey launches a proprietary operation system that bypasses the computer's operating system as well as any security flaws it may have, including spyware or hardware that records keystrokes and other data.

If the user loses his or her EncryptaKey, information within the device cannot be accessed. The RFID chip will not accept inquiries, as the transmitter only works if all three security measures have been satisfied. Additionally, the device is constructed of epoxy adhesives, so if an attempt to physically open the case occurs, all contents of the device, including its memory and RFID chip, will be destroyed. Should the user lose the device, a new one can be constructed quickly by accessing backup files through an authentication and rebuilding process.

In the EncryptaKey's compact and convenient case, there are two memory chips, one of which is read-only and one of which is read-write. When the device is inserted into a computer, no reading of or writing to any hard drive occurs, making it impossible to steal data, which typically stays on a hard drive. Since the RAM is cleared at the end of each session, there are no traces of transactions left in the system's memory.

The EncryptaKey portal is ideal for conducting all online business. The portal allows users to receive current news and RSS feeds on subjects of personal interest; receive emails from multiple accounts so that they can be read and replied to in a secured environment; utilize personal-information-management tools such as contact lists, calendars, and event planners; and conduct voiceover IP telephone conversations.

For online use, the user registers with the EncryptaKey portal, and all account information is downloaded to the device from locations for organizations associated with EncryptaKey. This function prevents the user from having to register personal information online during each transaction. When connecting to the Internet, the user can insert the USB connector into the USB port of any computer, regardless of its operating system. Once a connection is established, the user's information is kept safe by the device's triple-DES secure VPN during Internet searching and purchasing.

During in-person transactions, the same downloading process occurs. The user pushes a button on the EncryptaKey, which activates the RFID chip after identification is complete. The user then selects a payment option by scrolling through the menu on the LCD screen. Once a payment option has been selected, the user presses a button while pointing the device at the RFID terminal, which then transmits the encryption from the device to the transaction agent located on the merchant's central computer. The usual sequence of authorizations occurs after this step has been completed. The transaction will only take place when the RFID button is activated.

The EncryptaKey is highly useful for government, healthcare, and financial agencies. Electronic voting and North American border issues have become increasingly important, and the Homeland Security Presidential Directive (HPSD-12) of 2004 called for a federal standard for secure identification. The EncryptaKey is pertinent to TSA and airport security, as it can confirm the identities of passengers and airline employees. It can also ensure the authenticity of the identities of those crossing the Canadian and Mexican borders. As electronic voting becomes more prevalent, new fraud issues will need to be addressed, as will online-voting security.

In the future, the government will also need to secure Social Security accounts while making them more accessible. Personnel at about 150 different levels, from doctors to billing clerks, have access to at least part of each patient's records, and more than 600,000 payers and providers handle billing and payment related to healthcare transactions. The main concern is establishing a national electronic health information infrastructure capable of providing electronic medical records (EMRs). The EncryptaKey solution is perfectly suited to address and alleviate these security concerns, as patients can be sure only authorized individuals will have access to their sensitive personal information.

As credit card fraud and identity theft have become major issues for consumers, EncryptaKey offers a fail-safe identity-verification solution and enables participating organizations to achieve real differentiation from competitors, strengthen relationships with existing customers, and attract new customers. In this insecure world, personal financial information is often at risk, whether the consumer is conducting an in-person or online transaction. Credit card data stored on a third-party system is vulnerable to theft, and its wire transmission is subject to interception. SSL is susceptible and can be cracked. Spyware can be used to capture and/or monitor transactions.

The villains of identity theft are all around you! Don't spend your life in a financial dungeon telling horror tales about how others are living it up on your nickel. Use spy technology against those who spy on you! EncryptaKey is your best defense during financial exchanges. Become an EncryptaKey-per today!
On the net:EncryptaKey
www.encryptakey.com/index.asp If this article has helped you in some way, will you say thanks by sharing it through a share, like, a link, or an email to someone you think would appreciate the reference.

Popular tags:

 errors  credit cards  USB ports  Bluetooth  fraud  LCD  wireless  businesses  customers  consumers


EmploymentCrossing was helpful in getting me a job. Interview calls started flowing in from day one and I got my dream offer soon after.
Jeremy E - Greenville, NC
  • All we do is research jobs.
  • Our team of researchers, programmers, and analysts find you jobs from over 1,000 career pages and other sources
  • Our members get more interviews and jobs than people who use "public job boards"
Shoot for the moon. Even if you miss it, you will land among the stars.
InformationTechnologyCrossing - #1 Job Aggregation and Private Job-Opening Research Service — The Most Quality Jobs Anywhere
InformationTechnologyCrossing is the first job consolidation service in the employment industry to seek to include every job that exists in the world.
Copyright © 2024 InformationTechnologyCrossing - All rights reserved. 21