Browse Definitions:
Definition

digital wallet

Contributor(s): Lauren Horwitz

In general, a digital wallet is a software application, usually for a smartphone, that serves as an electronic version of a physical wallet.

Google launched a product called Google Wallet in May 2011. According to Stephanie Tilenius, vice president of commerce at Google, the application has the potential for storing information on other cards, such as driver's licenses and health care cards. Other companies, including Visa, are also either researching or developing digital wallet products.

Because digital wallets are on devices that connect to the Internet, they will eventually be able to access much more information than could be carried in a physical wallet. Jenna Wortham describes the potential in a New York Times story about Visa's digital wallet:

"The company says that a customer's entire financial history could be securely stored in one spot, along with frequent-flier accounts, medical benefits, even appliance warranty information from Best Buy, replacing the jumble of account information that most people have stored in different locations -- on and offline."

In one scenario, for example, the health care card could connect to the owner's electronic health record (EHR), making his medical history immediately available in the event of a medical emergency.  Such a capacity could have an impact far beyond the efficiency of current mobile-payments technology that allows a smart phone or vendor transponder to be used for wireless point-of-sale (POS) payments.

While the future of digital wallets may carry personal information such as electronic health information, today's digital wallet formulation largely involves retail information, such as payment methods and applications that enable consumers to get discounts, enter store loyalty programs and receive promotions via a mobile device that they can redeem at the store.  These digital wallets, or mobile wallets, help customers pay on mobile devices and receive discounts and other offers.

Mobile wallets employ several technologies, including mobile apps, mobile hardware devices, near-field communication and security methods like tokenization to create a user-friendly, mobile and ostensibly secure payment experience. In some cases, in addition to apps and mobile devices, retailers are experimenting with using devices such as Beacons to send relevant information to consumers.

While mobile wallet technology is still being adopted incrementally, it has gained traction alongside the increasing use of mobile devices in e-commerce (in 2013, mobile devices overtook traditional PCs in online shopping) and the rise of the voice of the customer, whereby customers have more power in the interaction with companies in negotiating the terms of service.

Technologies being used for mobile wallet include near field communication (NFC), Bluetooth, WiFi, and RFI, a short-range transmission system. As of this writing, companies who provide mobile payment systems include Apple, Google, Samsung, PayPal and more.

Beacons are also being used in concert with mobile wallets. They use short-range, low-energy Bluetooth transmitters to send alerts to mobile devices within 100 feet of them. Beacons may tell consumers to redeem coupons, earn points or pick-up items on their shopping lists. When a consumer walks into a participating retailer, the store's beacon will communicate with the consumer's phone and highlight specials, discounts or coupons.

If a consumer makes a purchase, another beacon in the store's cash register can communicate with the pass in the consumer's mobile wallet.

One reason for incremental adoption of mobile wallets is concern about customer data security. Some providers, like Apple Pay and Google Wallet, use tokenization, which masks credit card information and is transaction-specific to prevent hackers from gaining access to consumers' personal data. The random sequence, or token, acts as a substitute value for the actual PAN while the data is at rest inside a retailer's systems. The security space is competitive, so it may take time for security standards to coalesce.

Still, consumers remain leery of using mobile wallet technology. They are, however, more likely to elect for it if they receive discounts and other perks in exchange.

This was last updated in June 2011 ???publishDate.suggestedBy???

Continue Reading About digital wallet

Join the conversation

2 comments

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

Is your company positioning itself to cater to customers who use mobile wallets?
Cancel
Digital Wallets are most convenient and easy to use. Keep bitcoins in your Digital Wallet as much as you require without getting worried about loss. You can have your Digital Wallet easily at www.bits4less.com.
Cancel

-ADS BY GOOGLE

File Extensions and File Formats

SearchCompliance

  • smart contract

    A smart contract, also known as a cryptocontract, is a computer program that directly controls the transfer of digital currencies...

  • risk map (risk heat map)

    A risk map, also known as a risk heat map, is a data visualization tool for communicating specific risks an organization faces. A...

  • internal audit (IA)

    An internal audit (IA) is an organizational initiative to monitor and analyze its own business operations in order to determine ...

SearchCloudProvider

  • cloud ecosystem

    A cloud ecosystem is a complex system of interdependent components that all work together to enable cloud services.

  • cloud services

    Cloud services is an umbrella term that may refer to a variety of resources provided over the internet, or to professional ...

  • uncloud (de-cloud)

    The term uncloud describes the action or process of removing applications and data from a cloud computing platform.

SearchSecurity

  • cyberextortion

    Cyberextortion is a crime involving an attack or threat of an attack coupled with a demand for money or some other response in ...

  • Cybercrime

    Cybercrime is any criminal activity that involves a computer, networked device or a network.

  • National Security Agency (NSA)

    The National Security Agency is the official U.S. cryptologic organization of the United States Intelligence Community under the ...

SearchHealthIT

  • Practice Fusion

    Practice Fusion Inc. is a San Francisco-based company that developed a free electronic health record (EHR) system available to ...

  • RHIA (Registered Health Information Administrator)

    An RHIA, or registered health information administrator, is a certified professional who oversees the creation and use of patient...

  • 21st Century Cures Act

    The 21st Century Cures Act is a wide-ranging healthcare bill that funds medical research and development, medical device ...

SearchDisasterRecovery

SearchStorage

  • storage medium (storage media)

    In computers, a storage medium is any technology -- including devices and materials -- used to place, keep and retrieve ...

  • Random Access Memory (RAM)

    Random Access Memory (RAM) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • floating gate transistor (FGT)

    A floating gate transistor (FGT) is a complementary metal-oxide semiconductor (CMOS) technology capable of holding an electrical ...

SearchSolidStateStorage

  • hybrid hard disk drive (HDD)

    A hybrid hard disk drive is an electromechanical spinning hard disk that contains some amount of NAND Flash memory.

Close