SlideShare a Scribd company logo
1
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
A FinTech Company
2CONCEPT APPROACH
3OPPORTUNITY SUMMARY
What Is TokenID?
A patent-pending tokenization technology that issues a one-time-use
credit card number for alternative payment methods, allowing
Payment Service Providers to be accepted by any existing credit
card system
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
4SOLUTION
The TokenID solution:
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
• A universal solution for payment service providers
• Converts any payment into a 16-digit credit card token
• Tokens useless if stolen after a transaction
• Works with online websites and physical point-of-sale
5
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
SecurityPayment
Authentication MechanismUniversal Convertibility
TWO MAIN ADVANTAGES
6
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
What if Apple Pay used TokenID technology?
7STEP 1 – USER SELECTS APPLE PAY
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
• Apple Pay is pre-
installed as a default in
the Safari Browser
• During the payment
process, the user clicks
on the Apple Pay
browser icon
Apple Pay Logo: http://www.wikipedia.com
8STEP 2 – USER ENTERS PHONE DETAILS
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
• The user is prompted
to enter in their iPhone
number and click
continue
• Once the user clicks on
“Remember my
iPhone”, this step is
omitted for all future
transactions
Apple Pay Logo: http://www.wikipedia.com
9STEP 3 – CONFIRMATION VIA iPHONE
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
• A notification is sent to the
iPhone via TokenID technology,
and the user confirms payment
via Apple Pay biometric
fingerprint verification
Photo: http://s3.amazonaws.com
10STEP 4 – VIRTUAL CARD DELIVERY
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
• After Apple Pay verification, a
one-time virtual credit card
number is issued by TokenID for
use on the specified merchant
website
• The one-time use credit card
details are auto-populated in the
merchant credit card payment
fields, and checkout can be
completed
11APPLE PAY PROBLEMS SOLVED
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
• Merchant API integration is no longer necessary, enabling
Apple Pay to work with any online merchant
• Apple Pay user payment details can never be compromised
for online purchases, even during merchant breaches
• Safari browser has a major selling point for increasing
user browser installs and generating revenue
• TokenID is free and costs nothing for Apple Photo credit: www.gotcredit.com
12
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
What if Facebook used TokenID technology?
13STEP 1 - FACEBOOK MESSENGER PAYMENTS
• The Facebook peer-to-peer payments
model allows for transference of funds
from one end-user to another
• A transaction occurs in three-steps,
where money is sent, but it cannot be
spent outside of Facebook
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
Photo: http://www.fortune.com
14STEP 2 - MESSENGER POINT-OF-SALE PAYMENTS
• Using TokenID technology, messenger
transactions can be converted into
one-time use virtual credit cards and
redeemed at NFC POS terminals
• No internet connection is needed for
messenger to function as a reliable
transaction system
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
Photo: http://www.dailytech.com/ & http;//www.blogcdn.com
15FACEBOOK PROBLEMS SOLVED
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
• Messenger can be used for real-world POS transactions
• User payment details are protected from all external
parties
• Enables potential payment applications on websites
outside of Facebook
• TokenID is free and adds value at no cost to Facebook
Photo credit: www.facebook.com
16
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
What if PayPal used TokenID technology?
17PAYPAL GOES OFFLINE
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
• The user approaches mobile device to contacless
POS and activate mobile application
• After PayPal authorization, a one-time virtual credit
card number is issued by TokenID and sent to POS
PayPal Logo: http://www.wikipedia.com
18PAYPAL BENEFITS
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
• PayPal expands its merchants base overnight with
no need in integration and business arrangements
• PayPal preserves high level of payment security
• Supports both online and POS (via NFC/SMT)
payments
• TokenID service is free and costs nothing for PayPal Photo credit: www.gotcredit.com
19
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
Use case: PayPal. The Purchase volume (in $ billion)
* WorldPay Report 2013
** Market Statistics & Industry Facts 2013
*** The 2013 Federal Reserve payments Study
20
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
Use case: PayPal. Estimated revenue growth.
Revenue sharing rate = 50%
Fee margin = 1.5%
CPN – card not present transactions
CP – card present transactions
100%
115%
134%
175%
Assumptions:
21OTHER OPPORTUNITIES
Foreign Exchange Industry: $5.3 trillion daily
Stock Market Exchanges: $64 trillion per year
Worldwide Online E-Commerce: $1.5 trillion per year
Global Remittance: $600 billion per year
Non-Cash Payment & Bank Systems: $333 billion per year
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
RECYCLING
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
AUTHENTICATIONTOKENIZATION:
Authentication-Based
Tokenization
Recycling Tokenization
Connection independence
Unlimited scalability
Interception invulnerability
24
THANK YOU
Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd.
It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
TokenID Security Ltd
Tel. +972 (54) 4229251
E-mail: info@tokenid.com
Web: www.tokenid.com

More Related Content

What's hot

Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Goutama Bachtiar
 
Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared Images
IRJET Journal
 
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
Netcetera
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
CSCJournals
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET Journal
 
Payment Tokenization
Payment TokenizationPayment Tokenization
Payment Tokenization
Hamid Ghorbani
 
Mobile payment-security-risk-and-response
Mobile payment-security-risk-and-responseMobile payment-security-risk-and-response
Mobile payment-security-risk-and-response
DESMOND YUEN
 
CELL PHONE PAYMENT PROCESSING SYSTEM
CELL PHONE PAYMENT PROCESSING SYSTEMCELL PHONE PAYMENT PROCESSING SYSTEM
CELL PHONE PAYMENT PROCESSING SYSTEM
Tony TRAN
 
Invest in bitcoins , and cryptocurrency at buyUcoin - India's best crypto tra...
Invest in bitcoins , and cryptocurrency at buyUcoin - India's best crypto tra...Invest in bitcoins , and cryptocurrency at buyUcoin - India's best crypto tra...
Invest in bitcoins , and cryptocurrency at buyUcoin - India's best crypto tra...
PrathamJaisz
 
E wallet.ppt
E wallet.pptE wallet.ppt
E wallet.ppt
Mohamed Enayet
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for Banking
Yiannis Hatzopoulos
 
Digital Payment in 2020 - Kurt Schmid, Netcetera
Digital Payment in 2020 - Kurt Schmid, NetceteraDigital Payment in 2020 - Kurt Schmid, Netcetera
Digital Payment in 2020 - Kurt Schmid, Netcetera
Netcetera
 
E-money Payment System
E-money Payment SystemE-money Payment System
E-money Payment System
Mikhail Miroshnichenko
 
Digital wallet
Digital walletDigital wallet
Digital wallet
Sohil Gupta
 
Seamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceSeamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experience
Netcetera
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
Sejahtera Affif
 
How to use digital wallet effectively
How to use digital wallet effectivelyHow to use digital wallet effectively
How to use digital wallet effectively
1payjsc
 
Smart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc paymentSmart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc payment
Kona Software Lab Limited.
 
emv-ebook
emv-ebookemv-ebook
emv-ebook
Richard Dover
 
The achilles heel of GPN Card implementation
The achilles heel of GPN Card implementationThe achilles heel of GPN Card implementation
The achilles heel of GPN Card implementation
idsecconf
 

What's hot (20)

Electronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment IndustryElectronic Payment Fundamentals: When Tech Embracing Payment Industry
Electronic Payment Fundamentals: When Tech Embracing Payment Industry
 
Online Secure payment System using shared Images
Online Secure payment System using shared ImagesOnline Secure payment System using shared Images
Online Secure payment System using shared Images
 
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
3-D Secure 2.0 - Stephan Rüdisüli, Netcetera & Patrick Juffern, INFORM
 
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
Security Architecture for On-Line Mutual Funds Trading With Multiple Mobile A...
 
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
IRJET - A Paper on Enhanced PIN Security for SBI ATM through Aadhaar Linked O...
 
Payment Tokenization
Payment TokenizationPayment Tokenization
Payment Tokenization
 
Mobile payment-security-risk-and-response
Mobile payment-security-risk-and-responseMobile payment-security-risk-and-response
Mobile payment-security-risk-and-response
 
CELL PHONE PAYMENT PROCESSING SYSTEM
CELL PHONE PAYMENT PROCESSING SYSTEMCELL PHONE PAYMENT PROCESSING SYSTEM
CELL PHONE PAYMENT PROCESSING SYSTEM
 
Invest in bitcoins , and cryptocurrency at buyUcoin - India's best crypto tra...
Invest in bitcoins , and cryptocurrency at buyUcoin - India's best crypto tra...Invest in bitcoins , and cryptocurrency at buyUcoin - India's best crypto tra...
Invest in bitcoins , and cryptocurrency at buyUcoin - India's best crypto tra...
 
E wallet.ppt
E wallet.pptE wallet.ppt
E wallet.ppt
 
Tellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for BankingTellerpass - an OTP SIM applet for Banking
Tellerpass - an OTP SIM applet for Banking
 
Digital Payment in 2020 - Kurt Schmid, Netcetera
Digital Payment in 2020 - Kurt Schmid, NetceteraDigital Payment in 2020 - Kurt Schmid, Netcetera
Digital Payment in 2020 - Kurt Schmid, Netcetera
 
E-money Payment System
E-money Payment SystemE-money Payment System
E-money Payment System
 
Digital wallet
Digital walletDigital wallet
Digital wallet
 
Seamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experienceSeamless 3-D Secure e-commerce experience
Seamless 3-D Secure e-commerce experience
 
Cscu module 08 securing online transactions
Cscu module 08 securing online transactionsCscu module 08 securing online transactions
Cscu module 08 securing online transactions
 
How to use digital wallet effectively
How to use digital wallet effectivelyHow to use digital wallet effectively
How to use digital wallet effectively
 
Smart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc paymentSmart card to the cloud for convenient, secured nfc payment
Smart card to the cloud for convenient, secured nfc payment
 
emv-ebook
emv-ebookemv-ebook
emv-ebook
 
The achilles heel of GPN Card implementation
The achilles heel of GPN Card implementationThe achilles heel of GPN Card implementation
The achilles heel of GPN Card implementation
 

Similar to TokenID introduction

figo Banking API: A Banking Service Provider for FinTech Startups
figo Banking API: A Banking Service Provider for FinTech Startupsfigo Banking API: A Banking Service Provider for FinTech Startups
figo Banking API: A Banking Service Provider for FinTech Startups
Lars Markull
 
Top crypto wallets best 7 bitcoin wallet apps in 2022
Top crypto wallets  best 7 bitcoin wallet apps in 2022Top crypto wallets  best 7 bitcoin wallet apps in 2022
Top crypto wallets best 7 bitcoin wallet apps in 2022
Moon Technolabs Pvt. Ltd.
 
R.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to payR.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to pay
Meet Magento Italy
 
Brand New Web3 Wallet
Brand New Web3 WalletBrand New Web3 Wallet
Brand New Web3 Wallet
ssuser7259e6
 
OpenID Connect
OpenID ConnectOpenID Connect
OpenID Connect
Farasath Ahamed
 
A Comprehensive guide to understanding Digital Wallets.pdf
A Comprehensive guide to understanding Digital Wallets.pdfA Comprehensive guide to understanding Digital Wallets.pdf
A Comprehensive guide to understanding Digital Wallets.pdf
Pay10
 
bitcoin app - Google Docs.pdf
bitcoin app - Google Docs.pdfbitcoin app - Google Docs.pdf
bitcoin app - Google Docs.pdf
harikacheluru
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO Alliance
 
Cybrilla fintech presentation
Cybrilla fintech presentationCybrilla fintech presentation
Cybrilla fintech presentation
Anchal Jajodia
 
Boosting and securing online shopping - making PIN on phone a reality
Boosting and securing online shopping - making PIN on phone a realityBoosting and securing online shopping - making PIN on phone a reality
Boosting and securing online shopping - making PIN on phone a reality
BSP Media Group
 
IDGate: One Solution for All EKYC Needs
 IDGate: One Solution for All EKYC Needs  IDGate: One Solution for All EKYC Needs
IDGate: One Solution for All EKYC Needs
Nadine A. Jaafar
 
Fetch payments Pitch Deck
Fetch payments Pitch DeckFetch payments Pitch Deck
Fetch payments Pitch Deck
VimalSelvamany
 
Digits ico-deck-v9 (1)
Digits ico-deck-v9 (1)Digits ico-deck-v9 (1)
Digits ico-deck-v9 (1)
Etheralabs
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial
FIDO Alliance
 
cost to build bitcoin - Google Docs.pdf
cost to build bitcoin - Google Docs.pdfcost to build bitcoin - Google Docs.pdf
cost to build bitcoin - Google Docs.pdf
harikacheluru
 
bitcoin - Google Docs.pdf
bitcoin - Google Docs.pdfbitcoin - Google Docs.pdf
bitcoin - Google Docs.pdf
harikacheluru
 
Mis paytm (1)
Mis paytm (1)Mis paytm (1)
Mis paytm (1)
DevanshuGohri
 
Bitgold deck ir 5.6.2015
Bitgold deck ir 5.6.2015Bitgold deck ir 5.6.2015
Bitgold deck ir 5.6.2015
BitGold Inc
 
Passwordless Mobile Banking.pdf
Passwordless Mobile Banking.pdfPasswordless Mobile Banking.pdf
Passwordless Mobile Banking.pdf
KMSSolutionsMarketin
 
FinTech, Internet of Things & Patents
FinTech, Internet of Things & PatentsFinTech, Internet of Things & Patents
FinTech, Internet of Things & Patents
Alex G. Lee, Ph.D. Esq. CLP
 

Similar to TokenID introduction (20)

figo Banking API: A Banking Service Provider for FinTech Startups
figo Banking API: A Banking Service Provider for FinTech Startupsfigo Banking API: A Banking Service Provider for FinTech Startups
figo Banking API: A Banking Service Provider for FinTech Startups
 
Top crypto wallets best 7 bitcoin wallet apps in 2022
Top crypto wallets  best 7 bitcoin wallet apps in 2022Top crypto wallets  best 7 bitcoin wallet apps in 2022
Top crypto wallets best 7 bitcoin wallet apps in 2022
 
R.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to payR.Grassi - P.Sardo - One integration: every wat to pay
R.Grassi - P.Sardo - One integration: every wat to pay
 
Brand New Web3 Wallet
Brand New Web3 WalletBrand New Web3 Wallet
Brand New Web3 Wallet
 
OpenID Connect
OpenID ConnectOpenID Connect
OpenID Connect
 
A Comprehensive guide to understanding Digital Wallets.pdf
A Comprehensive guide to understanding Digital Wallets.pdfA Comprehensive guide to understanding Digital Wallets.pdf
A Comprehensive guide to understanding Digital Wallets.pdf
 
bitcoin app - Google Docs.pdf
bitcoin app - Google Docs.pdfbitcoin app - Google Docs.pdf
bitcoin app - Google Docs.pdf
 
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in EuropeFIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
FIDO & PSD2: Solving the Strong Customer Authentication Challenge in Europe
 
Cybrilla fintech presentation
Cybrilla fintech presentationCybrilla fintech presentation
Cybrilla fintech presentation
 
Boosting and securing online shopping - making PIN on phone a reality
Boosting and securing online shopping - making PIN on phone a realityBoosting and securing online shopping - making PIN on phone a reality
Boosting and securing online shopping - making PIN on phone a reality
 
IDGate: One Solution for All EKYC Needs
 IDGate: One Solution for All EKYC Needs  IDGate: One Solution for All EKYC Needs
IDGate: One Solution for All EKYC Needs
 
Fetch payments Pitch Deck
Fetch payments Pitch DeckFetch payments Pitch Deck
Fetch payments Pitch Deck
 
Digits ico-deck-v9 (1)
Digits ico-deck-v9 (1)Digits ico-deck-v9 (1)
Digits ico-deck-v9 (1)
 
FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial FIDO UAF Specifications: Overview & Tutorial
FIDO UAF Specifications: Overview & Tutorial
 
cost to build bitcoin - Google Docs.pdf
cost to build bitcoin - Google Docs.pdfcost to build bitcoin - Google Docs.pdf
cost to build bitcoin - Google Docs.pdf
 
bitcoin - Google Docs.pdf
bitcoin - Google Docs.pdfbitcoin - Google Docs.pdf
bitcoin - Google Docs.pdf
 
Mis paytm (1)
Mis paytm (1)Mis paytm (1)
Mis paytm (1)
 
Bitgold deck ir 5.6.2015
Bitgold deck ir 5.6.2015Bitgold deck ir 5.6.2015
Bitgold deck ir 5.6.2015
 
Passwordless Mobile Banking.pdf
Passwordless Mobile Banking.pdfPasswordless Mobile Banking.pdf
Passwordless Mobile Banking.pdf
 
FinTech, Internet of Things & Patents
FinTech, Internet of Things & PatentsFinTech, Internet of Things & Patents
FinTech, Internet of Things & Patents
 

Recently uploaded

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

TokenID introduction

  • 1. 1 Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. A FinTech Company
  • 3. 3OPPORTUNITY SUMMARY What Is TokenID? A patent-pending tokenization technology that issues a one-time-use credit card number for alternative payment methods, allowing Payment Service Providers to be accepted by any existing credit card system Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
  • 4. 4SOLUTION The TokenID solution: Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. • A universal solution for payment service providers • Converts any payment into a 16-digit credit card token • Tokens useless if stolen after a transaction • Works with online websites and physical point-of-sale
  • 5. 5 Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. SecurityPayment Authentication MechanismUniversal Convertibility TWO MAIN ADVANTAGES
  • 6. 6 Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. What if Apple Pay used TokenID technology?
  • 7. 7STEP 1 – USER SELECTS APPLE PAY Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. • Apple Pay is pre- installed as a default in the Safari Browser • During the payment process, the user clicks on the Apple Pay browser icon Apple Pay Logo: http://www.wikipedia.com
  • 8. 8STEP 2 – USER ENTERS PHONE DETAILS Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. • The user is prompted to enter in their iPhone number and click continue • Once the user clicks on “Remember my iPhone”, this step is omitted for all future transactions Apple Pay Logo: http://www.wikipedia.com
  • 9. 9STEP 3 – CONFIRMATION VIA iPHONE Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. • A notification is sent to the iPhone via TokenID technology, and the user confirms payment via Apple Pay biometric fingerprint verification Photo: http://s3.amazonaws.com
  • 10. 10STEP 4 – VIRTUAL CARD DELIVERY Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. • After Apple Pay verification, a one-time virtual credit card number is issued by TokenID for use on the specified merchant website • The one-time use credit card details are auto-populated in the merchant credit card payment fields, and checkout can be completed
  • 11. 11APPLE PAY PROBLEMS SOLVED Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. • Merchant API integration is no longer necessary, enabling Apple Pay to work with any online merchant • Apple Pay user payment details can never be compromised for online purchases, even during merchant breaches • Safari browser has a major selling point for increasing user browser installs and generating revenue • TokenID is free and costs nothing for Apple Photo credit: www.gotcredit.com
  • 12. 12 Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. What if Facebook used TokenID technology?
  • 13. 13STEP 1 - FACEBOOK MESSENGER PAYMENTS • The Facebook peer-to-peer payments model allows for transference of funds from one end-user to another • A transaction occurs in three-steps, where money is sent, but it cannot be spent outside of Facebook Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. Photo: http://www.fortune.com
  • 14. 14STEP 2 - MESSENGER POINT-OF-SALE PAYMENTS • Using TokenID technology, messenger transactions can be converted into one-time use virtual credit cards and redeemed at NFC POS terminals • No internet connection is needed for messenger to function as a reliable transaction system Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. Photo: http://www.dailytech.com/ & http;//www.blogcdn.com
  • 15. 15FACEBOOK PROBLEMS SOLVED Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. • Messenger can be used for real-world POS transactions • User payment details are protected from all external parties • Enables potential payment applications on websites outside of Facebook • TokenID is free and adds value at no cost to Facebook Photo credit: www.facebook.com
  • 16. 16 Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. What if PayPal used TokenID technology?
  • 17. 17PAYPAL GOES OFFLINE Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. • The user approaches mobile device to contacless POS and activate mobile application • After PayPal authorization, a one-time virtual credit card number is issued by TokenID and sent to POS PayPal Logo: http://www.wikipedia.com
  • 18. 18PAYPAL BENEFITS Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. • PayPal expands its merchants base overnight with no need in integration and business arrangements • PayPal preserves high level of payment security • Supports both online and POS (via NFC/SMT) payments • TokenID service is free and costs nothing for PayPal Photo credit: www.gotcredit.com
  • 19. 19 Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. Use case: PayPal. The Purchase volume (in $ billion) * WorldPay Report 2013 ** Market Statistics & Industry Facts 2013 *** The 2013 Federal Reserve payments Study
  • 20. 20 Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. Use case: PayPal. Estimated revenue growth. Revenue sharing rate = 50% Fee margin = 1.5% CPN – card not present transactions CP – card present transactions 100% 115% 134% 175% Assumptions:
  • 21. 21OTHER OPPORTUNITIES Foreign Exchange Industry: $5.3 trillion daily Stock Market Exchanges: $64 trillion per year Worldwide Online E-Commerce: $1.5 trillion per year Global Remittance: $600 billion per year Non-Cash Payment & Bank Systems: $333 billion per year Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd.
  • 22. RECYCLING Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. AUTHENTICATIONTOKENIZATION: Authentication-Based Tokenization Recycling Tokenization Connection independence Unlimited scalability Interception invulnerability
  • 23. 24 THANK YOU Notice: The content of this presentation is proprietary and confidential information of TokenID Security Ltd. It is not intended to be distributed to any third party without the expressed written consent of TokenID Security Ltd. TokenID Security Ltd Tel. +972 (54) 4229251 E-mail: info@tokenid.com Web: www.tokenid.com