Browse Definitions:
Definition

digital wallet

Contributor(s): Lauren Horwitz

In general, a digital wallet is a software application, usually for a smartphone, that serves as an electronic version of a physical wallet.

Google launched a product called Google Wallet in May 2011. According to Stephanie Tilenius, vice president of commerce at Google, the application has the potential for storing information on other cards, such as driver's licenses and health care cards. Other companies, including Visa, are also either researching or developing digital wallet products.

Because digital wallets are on devices that connect to the Internet, they will eventually be able to access much more information than could be carried in a physical wallet. Jenna Wortham describes the potential in a New York Times story about Visa's digital wallet:

"The company says that a customer's entire financial history could be securely stored in one spot, along with frequent-flier accounts, medical benefits, even appliance warranty information from Best Buy, replacing the jumble of account information that most people have stored in different locations -- on and offline."

In one scenario, for example, the health care card could connect to the owner's electronic health record (EHR), making his medical history immediately available in the event of a medical emergency.  Such a capacity could have an impact far beyond the efficiency of current mobile-payments technology that allows a smart phone or vendor transponder to be used for wireless point-of-sale (POS) payments.

While the future of digital wallets may carry personal information such as electronic health information, today's digital wallet formulation largely involves retail information, such as payment methods and applications that enable consumers to get discounts, enter store loyalty programs and receive promotions via a mobile device that they can redeem at the store.  These digital wallets, or mobile wallets, help customers pay on mobile devices and receive discounts and other offers.

Mobile wallets employ several technologies, including mobile apps, mobile hardware devices, near-field communication and security methods like tokenization to create a user-friendly, mobile and ostensibly secure payment experience. In some cases, in addition to apps and mobile devices, retailers are experimenting with using devices such as Beacons to send relevant information to consumers.

While mobile wallet technology is still being adopted incrementally, it has gained traction alongside the increasing use of mobile devices in e-commerce (in 2013, mobile devices overtook traditional PCs in online shopping) and the rise of the voice of the customer, whereby customers have more power in the interaction with companies in negotiating the terms of service.

Technologies being used for mobile wallet include near field communication (NFC), Bluetooth, WiFi, and RFI, a short-range transmission system. As of this writing, companies who provide mobile payment systems include Apple, Google, Samsung, PayPal and more.

Beacons are also being used in concert with mobile wallets. They use short-range, low-energy Bluetooth transmitters to send alerts to mobile devices within 100 feet of them. Beacons may tell consumers to redeem coupons, earn points or pick-up items on their shopping lists. When a consumer walks into a participating retailer, the store's beacon will communicate with the consumer's phone and highlight specials, discounts or coupons.

If a consumer makes a purchase, another beacon in the store's cash register can communicate with the pass in the consumer's mobile wallet.

One reason for incremental adoption of mobile wallets is concern about customer data security. Some providers, like Apple Pay and Google Wallet, use tokenization, which masks credit card information and is transaction-specific to prevent hackers from gaining access to consumers' personal data. The random sequence, or token, acts as a substitute value for the actual PAN while the data is at rest inside a retailer's systems. The security space is competitive, so it may take time for security standards to coalesce.

Still, consumers remain leery of using mobile wallet technology. They are, however, more likely to elect for it if they receive discounts and other perks in exchange.

This was last updated in June 2011

Continue Reading About digital wallet

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Is your company positioning itself to cater to customers who use mobile wallets?
Cancel
Digital Wallets are most convenient and easy to use. Keep bitcoins in your Digital Wallet as much as you require without getting worried about loss. You can have your Digital Wallet easily at www.bits4less.com.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • spear phishing

    Spear phishing is an email-spoofing attack that targets a specific organization or individual, seeking unauthorized access to ...

  • supercookie

    A supercookie is a type of tracking cookie inserted into an HTTP header by an internet service provider to collect data about a ...

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree -- sometimes referred to as a phone tree -- is a telecommunications chain for notifying specific individuals of an ...

  • mass notification system (MNS)

    A mass notification system is a platform that sends one-way messages to inform employees and the public of an emergency.

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

SearchStorage

  • GlusterFS (Gluster File System)

    GlusterFS (Gluster File System) is an open source distributed file system that can scale out in building-block fashion to store ...

  • virtual memory

    Virtual memory is a memory management capability of an OS that allows a computer to compensate for physical memory shortages by ...

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

SearchSolidStateStorage

  • PCIe SSD (PCIe solid-state drive)

    A PCIe SSD (PCIe solid-state drive) is a high-speed expansion card that attaches a computer to its peripherals.

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close