Apple Updates Keychain To Store Credit Card Info

What's Next In Payments®
7:16 PM EDT June 10th, 2013

Eventually, Apple will hold a conference or event that reveals major implications for the mobile payments industry.

But despite one interesting note from the Worldwide Developer Conference, yesterday was not that day.

Yes, WWDC lacked any references to Passbook or an “iWallet” or “iMoney” platform. And for the umpteenth time, Apple has remained mum on when (if ever) it will dive into NFC.

What we did learn, however, is that Apple is changing the way it stores credit card information on its devices via a new iCloud Keychain that could be big ramifications for online shopping.

As Wired noted in its coverage of WWDC, the new Keychain will store passwords in iCloud enabling syncing across devices. To keep credit card data secure, it will only sync to “trusted devices,” and uses 256-bit AES encryption. The new Keychain will only store credit card numbers and expiration dates – and not security codes — so it’s unclear if users will have to manually enter such information when they make purchases.

The new Keychain iteration comes as part of Apple’s massive overhaul to its operating system, Mac OS X Mavericks.

On Friday, Apple filed a patent application for a digital wallet, couponing and virtual currency platform. Apple made no such mention of the patent or any of its components at WWDC.

Read the full story here.

Also by This Author
What's Hot
Square Launches Register App Platform
Etsy Debuts mPOS Solution
Merchant Innovation
Ron Johnson’s New Company To Focus On Shopper Decisions
B2B Payments
WEX and Sinclair Oil Strike Long Term Contract
View All Articles ››
You May Also Like
Company Spotlight
Different mPOS Strokes for Different mPOS Folks
Digital River Offers A Sneak Peak At Mobile eCommerce Trends
Mobile Commerce
Trustwave Buys Cenzic To Beef Up App Testing Capability
B2B Payments
Tungsten Spent $6.5 Million for DocuSphere
Company Spotlight
Inside the Future of Commerce, Post Apple Pay
Alternative Financial Services
Death Threats, Fraudsters and Lawsuits
How to Overcome the 10 Most Common Cyber Threats
View All Articles ››