EFICI advocates barcode alternative to NFC for m-payments

Source: EFICI

Today EFICI CORP launched EFICASH™ a mobile payments platform for banks and cellular phone companies that addresses one of the main obstacles of using cell phones as a mean of payment at point of sale.

"Mobile payments need to be jump-started by using the existing infrastructure, and taking advantage of the cameras on cellular phones to read 2D Codes displayed at the point of sales (POS), to expedite mobile payments," said Andres Gonzalez, CEO of EFICI.

The EFICASH™ mission is to enable Mobile payments in the U.S. and Latin America one step at a time. "In the US and Latin America, the adoption of Mobile Payments is progressing slowly compared to other regions such as Europe, Asia and Africa. Success requires the introduction of a lower cost model for financial institutions, Mobile Network Operators (MNOs), merchants and users, with a disruptive technology to break the barriers of adoption," said Gonzalez.

With EFICASH™, rather than waiting for the Near Field Communications technology (NFC), users can use phones with integrated cameras to interpret those 2D codes and expedite payments by minimizing keystrokes. Today, more than 50 percent of existing phones in the U.S. have cameras. "If you already have that infrastructure in place, why not leverage it to enable mobile transactions with a low cost of entry for everyone? The technology is here today," said Gonzalez.

EFICASH™ enables financial institutions and MNOs to work together in bringing mobile payments to fruition.

The application is based on a pre-paid model that securely allows consumers to make and receive payments by linking their debit, credit card and bank accounts. EFICASH™ can adapt to the needs of any institutional client in any country of the Americas. It has been designed to support multiple languages, currencies, types of accounts (individual and premier) and other customizations.

EFICASH™ has the safeguards to minimize the chance of fraud. "We have carefully cared for all the security aspects, including the network, the database, the operational process, the information transmission, the application security, among others," concluded Gonzalez.

Comments: (0)